Content deleted Content added
m ordinals not normally used in dates (WP:DATESNO); tidy |
HeyCallMeRed (talk | contribs) the second paragraph of the overview of the quantum key distribution article, which is linked in this sentence, answers "how" explicitly. The previous sentence contains a link to the no-cloning theorum article, which answers "how" implicitly in its first sentence. Tags: Mobile edit Mobile web edit |
||
Line 3:
{{Use dmy dates|date=September 2020}}
'''Quantum cryptography''' is the science of exploiting [[Quantum mechanics|quantum mechanical]] properties to perform [[cryptographic]] tasks.<ref>{{Cite journal|last1=Gisin|first1=Nicolas|last2=Ribordy|first2=Grégoire|last3=Tittel|first3=Wolfgang|last4=Zbinden|first4=Hugo|display-authors=|year=2002|title=Quantum cryptography|url=https://journals.aps.org/rmp/abstract/10.1103/RevModPhys.74.145|journal=Reviews of Modern Physics|volume=74|issue=1|pages=145–195|doi=10.1103/RevModPhys.74.145|arxiv=quant-ph/0101098|bibcode=2002RvMP...74..145G|s2cid=6979295}}</ref><ref name=":4">{{Cite journal|last1=Pirandola|first1=S.|last2=Andersen|first2=U. L.|last3=Banchi|first3=L.|last4=Berta|first4=M.|last5=Bunandar|first5=D.|last6=Colbeck|first6=R.|last7=Englund|first7=D.|last8=Gehring|first8=T.|last9=Lupo|first9=C.|last10=Ottaviani|first10=C.|last11=Pereira|first11=J. L.|display-authors=et al.|year=2020|title=Advances in quantum cryptography|url=https://www.osapublishing.org/aop/abstract.cfm?uri=aop-12-4-1012|journal=Advances in Optics and Photonics|volume=12|issue=4|pages=1012–1236|arxiv=1906.01645|doi=10.1364/AOP.361502|bibcode=2020AdOP...12.1012P|s2cid=174799187}}</ref> The best known example of quantum cryptography is [[quantum key distribution]], which offers an [[Information-theoretic security|information-theoretically secure]] solution to the [[key exchange]] problem. The advantage of quantum cryptography lies in the fact that it allows the completion of various cryptographic tasks that are proven or conjectured to be impossible using only classical (i.e. non-quantum) communication. For example, it is [[No-cloning theorem|impossible to copy]] data encoded in a [[quantum state]]. If one attempts to read the encoded data, the quantum state will be changed due to [[wave function collapse]] ([[no-cloning theorem]]). This could be used to detect eavesdropping
== History ==
|