Special Issue "Quantum Cryptography"
Deadline for manuscript submissions: closed (30 April 2015)
Quantum cryptography is today the most advanced quantum technology in our hands, with experiments involving entire metropolitan areas and with spin-off companies already selling prototypes. Current theoretical and experimental efforts are focused in many directions: Extending the maximum distance of key distribution, increasing its rate, using different frequencies, and developing new protocols which are more suitable for a future quantum network. This Special Issue aims to collect short review articles and original contributions regarding the most recent developments in this field. We welcome submissions on topics including, but not limited to: quantum key distribution (with discrete or continuous variable systems), secure quantum networks, untrusted-relay quantum cryptography, device-independent quantum cryptography, secret-key capacities, and quantum hacking.
Dr. Stefano Pirandola
- Gisin, N.; Ribordy, G.; Tittel, W.; Zbinden, H. Quantum cryptography. Rev. Mod. Phys. 2002, 74, 145–195.
- Ekert, A.K. Quantum cryptography based on Bell’s theorem. Phys. Rev. Lett. 1991, 67, 661–663.
- Braunstein, S.L.; Pirandola, S. Side-channel-free quantum key distribution. Phys. Rev. Lett. 2012, 108, 130502.
- Renner, R.; Gisin, N.; Kraus, B. Information-theoretic security proof for quantum-key-distribution protocols. Phys. Rev. A 2005, 72, 012332.
- Devetak, I.; Winter, A. Distillation of secret key and entanglement from quantum states. Proc. R. Soc. Lond. A 2005, 461, 207–235.
- Guha, S.; Hayden, P.; Krovi, H.; Lloyd, S.; Lupo, C.; Shapiro, J.H.; Takeoka, M.; Wilde, M.M. Quantum enigma machines and the locking capacity of a quantum channel. Phys. Rev. X 2014, 4, 011016.
- Pirandola, S.; Garcia-Patron, R.; Braunstein, S.L.; Lloyd, S. Direct and Reverse Secret-Key Capacities of a Quantum Channel. Phys. Rev. Lett. 2009, 102, 050503.
- Weedbrook, C.; Lance, A.M.; Bowen, W.P.; Symul, T.; Ralph, T.C.; Lam, P.K. Coherent State Quantum Key Distribution Without Random Basis Switching. Phys. Rev. A 2006, 73, 022316.
- Grosshans, F.; Van Assche, G.; Wenger, J.; Brouri, R.; Cerf, N.J.; Grangier, Ph. Quantum key distribution using gaussian-modulated coherent states. Nature 2003, 421, 238–241.
Manuscript Submission Information
Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All papers will be peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.
Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Entropy is an international peer-reviewed open access monthly journal published by MDPI.
Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.
- quantum key distribution
- secure quantum networks
- secret-key capacities
- device-independent quantum cryptography
- quantum cryptography with untrusted relays (measurement-device-independent quantum cryptography)
- quantum data hiding and data locking
- quantum direct communication
- quantum digital signatures
- quantum bit commitment
- quantum hacking and side-channel attacks