Quantum cryptography: Difference between revisions

Content deleted Content added
No edit summary
No edit summary
Line 6:
 
== History ==
In the early 1970s, [[Stephen Wiesner]], then at Columbia University in New York, introduced the concept of quantum conjugate coding. His seminal paper titled "Conjugate Coding" was rejected by the [[IEEE Information Theory Society]] but was eventually published in 1983 in ''[[ACM SIGACT|SIGACT News]]''.<ref name="ExpQC">{{cite journal|last1=Bennett|first1=Charles H.|display-authors=etal|title=Experimental quantum cryptography|journal=Journal of Cryptology|volume=5|issue=1|date=1992|pages=3–28|doi=10.1007/bf00191318|s2cid=206771454|doi-access=free}}</ref> In this paper he showed how to store or transmit two messages by encoding them in two "conjugate [[observable]]s", such as linear and circular [[Polarization (waves)|polarization]] of [[photons]],<ref>{{cite journal|last=Wiesner|first=Stephen|title=Conjugate coding|journal=ACM SIGACT News|volume=15|issue=1|date=1983|pages=78–88|doi=10.1145/1008908.1008920|s2cid=207155055}}</ref> so that either, but not both, properties may be received and decoded. It was not until [[Charles H. Bennett (computer scientist)|Charles H. Bennett]], of the IBM's [[Thomas J. Watson Research Center]], and [[Gilles Brassard]] met in 1979 at the 20th IEEE Symposium on the Foundations of Computer Science, held in Puerto Rico, that they discovered how to incorporate Wiesner's findings. "The main breakthrough came when we realized that photons were never meant to store information, but rather to transmit it."<ref name="ExpQC" /> In 1984, building upon this work, Bennett and Brassard proposed a method for [[secure communication]], which is now called [[BB84]], the first Quantum Key Distribution system.<ref>{{cite journal|last1=Bennett|first1=Charles H.|last2=Brassard|first2=Gilles|title=Quantum cryptography: Public key distribution and coin tossing|journal=Proceedings of IEEE International Conference on Computers, Systems and Signal Processing|volume=175|page=8|date=1984}}</ref><ref>{{Cite web |date=2023-11-29 |title=What Is Quantum Cryptography? {{!}} IBM |url=https://www.ibm.com/topics/quantum-cryptography |access-date=2024-09-25 |website=www.ibm.com |language=en}}</ref> Independently, in 1991 [[Artur Ekert]] proposed to use Bell's inequalities to achieve secure key distribution.<ref>{{cite journal | last1 = Ekert | first1 = A | year = 1991 | title = Quantum cryptography based on Bell's theorem| journal = Physical Review Letters | volume = 67 | issue = 6 | pages = 661–663 | doi = 10.1103/physrevlett.67.661 | bibcode = 1991PhRvL..67..661E | pmid = 10044956 | s2cid = 27683254 }}</ref> Ekert's protocol for the key distribution, as it was subsequently shown by [[Dominic Mayers]] and [[Andrew Yao]], offers device-independent quantum key distribution.
 
Companies that manufacture quantum cryptography systems include [[MagiQ Technologies, Inc.]] (Boston), [[ID Quantique]] (Geneva), [[QuintessenceLabs]] (Canberra, Australia), [[Toshiba]] (Tokyo), [[QNu Labs]] (India) and SeQureNet (Paris).