Acknowledgments
This work was supported by the Laboratory for Telecommunication Sciences [grant number 5743400-304-6448].
Disclaimer
The views expressed in this paper are those of the authors and do not reflect the official policy or position of the United States Air Force, the Department of Defense, or the U.S. Government.
Bibliography
- Bennett, C. H., & Brassard, G. (1984). Quantum cryptography: public key distribution and coin tossing. Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, 175, no. 0.
- Bernstein, D. J. (2009). Post-quantum cryptography. Springer.
- Bieve, C. (2016, January 13). China’s quantum space pioneer: We need to explore the unknown. Retrieved from Nature: http://www.nature.com/news/china-s-quantum-space-pioneer-we-need-to-explore-the-unknown-1.19166
- Dixon, A. R., Dynes, J. F., Lucamarini, M., Fröhlich, B., Sharpe, A. W., Plews, A., . . . al., e. (2015). High speed prototype quantum key distribution system and long term field trial. Optics Express, 23(6), 7583-7592.
- ETSI. (2015, June 08). Quantum key distribution standards. Retrieved from www.etsi.org/technologies-clusters/technologies/quantum-key-distribution
- Gisin, N. (2015, October 21). Quantum Cryptography: where do we stand? Retrieved from https://www.youtube.com/watch?v=Vk9T-tVAI4c&feature=youtu.be
- Gisin, N., Ribordy, G., Tittel, W., & Zbinden, H. (2002). Quantum cryptography. Reviews of Modern Physics, 74(1), 145-195. Retrieved from 10.1103/RevModPhys.74.145
- ID Quantique. (2016). Retrieved from http://www.idquantique.com/
- Institute of Quantum Computing, University of Waterloo. (2014). Quantum hacking lab. Retrieved Mar 14, 2014, from http://www.vad1.com/lab/
- Mailloux, L. O., Grimaila, M. R., Hodson, D. D., Baumgartner, G., & McLaughlin, C. (2015). Performance evaluations of quantum key distribution system architectures. IEEE Security and Privacy, 13(1), 30-40.
- Science, 351(6277), 1068-1070. Monz, T., Nigg, D., Martinez, E. A., Brandl, M. F., Schindler, P., Rines, R., . . . Blatt, R. (2015). Realization of a scalable Shor algorithm.
- NIST. (2016, March 07). Post-Quantum Crypto Project. Retrieved April 09, 2016, from http://csrc.nist.gov/groups/ST/post-quantum-crypto/
- NSA. (2015, August 19). Cryptography Today. Retrieved from Information Assurance: https://www.nsa.gov/ia/programs/suiteb_cryptography/
- Oesterling, L., Hayford, D., & Friend, G. (2012). Comparison of commercial and next generation quantum key distribution: Technologies for secure communication of information. Homeland Security (HST), 2012 IEEE Conference on Technologies for, (pp. 156-161). Retrieved from http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6459842
- Post-Quantum Cryptography. (2016, January 18). Post-Quantum Crypto 2016. Retrieved January 18, 2016, from https://pqcrypto2016.jp/
- Quantum Cryptography Conference. (2016). QCrypt 2015. Retrieved from 2015.qcrypt.net
- Scarani, V., & Kurtsiefer, C. (2009). The black paper of quantum cryptography: real implementation problems. Theoretical Computer Science, 560(1), 27–32.
- Scarani, V., Bechmann-Pasquinucci, H., Cerf, N. J., Dušek, M., Lütkenhaus, N., & Peev, M. (2009). The security of practical quantum key distribution. Reviews of Modern Physics, 81(3), 1301-1350. Retrieved from ttp://dx.doi.org/10.1103/RevModPhys.81.1301
- Shannon, C. E. (1949). Communication theory of secrecy systems. Bell System Technical Journal, 28, 656-715.
- Slutsky, B., Rao, R., Sun, P.-C., Tancevski, L., & Fainman, S. (1998). Defense frontier analysis of quantum cryptographic systems. Applied Optics, 37(14), 2869-2878.
- University of Maryland. (2016, April 30). Joint Center for Quantum Information and Computer Science. Retrieved from http://quics.umd.edu/
- Vernam, G. S. (1926). Cipher printing telegraph systems for secret wire and radio telegraphic communications. American Institute of Electrical Engineers, Transactions of the, 45, 295-301.
- Wang, S., Chen, W., Yin, Z.-Q., Li, H.-W., He, D.-Y., Li, Y.-H., . . . et al. (2014). Field and long-term demonstration of a wide area quantum key distribution network. Optics Express, 22(18), 21739-21756.
- Wiesner, S. (1983). Conjugate coding. ACM Sigact News, 15(1), pp. 78-88. Retrieved from http://dx.doi.org/10.1145/1008908.1008920
- Wootters, W. K., & Zurek, W. H. (1982). A single quantum cannot be cloned. Nature, 299(5886), 802-803. doi:10.1038/299802a0