Quantum Communications: Technologies and Applications

A special issue of Photonics (ISSN 2304-6732). This special issue belongs to the section "Quantum Photonics and Technologies".

Deadline for manuscript submissions: closed (30 September 2023) | Viewed by 2650

Special Issue Editors

College of Computer Science, Chongqing University, Chongqing, China
Interests: quantum information; quantum cryptography; quantum key distribution; quantum secret sharing; quantum private query; quantum state distinguish; quantum operation distinguish

E-Mail Website
Guest Editor
Shenzhen Polytechnic, Shenzhen, China
Interests: quantum cryptography; quantum computing; quantum communication; quantum information

Special Issue Information

Dear Colleagues,

Quantum communications have achieved information theoretic security for cryptographic tasks such as key distribution, secure direct communication, true random number and so on. Further, for a great multitude of other cryptographic tasks, quantum communications can provide a higher level of security which is independent of computational complexity, as well as lower communication complexity. Quantum key distribution is more mature in both theory and technology than other types of quantum communication protocols. However, other types of protocols also need to be developed to enrich the capabilities of quantum communication.

This Special Issue focuses on the technologies of quantum communication protocols, especially those in which the participants do not trust each other, and the technologies to solve practical security problems in a variety of quantum communications, including—but not limited to—quantum private query, quantum secret sharing, quantum coin flipping, quantum signature, quantum voting and so on.

This issue also focuses on the applications of quantum key distribution to solve other cryptographic problems and the applications of any other kind of quantum communication protocols to solve practical problems in network communication, financial activities and so on.

I look forward to receiving your contributions.

Dr. Bin Liu
Dr. Zhiwei Sun
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Photonics is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • quantum communication
  • practical security
  • quantum private query
  • quantum secret sharing
  • quantum network

Published Papers (2 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

13 pages, 795 KiB  
Article
A New Quantum Sealed-Bid Auction Protocol with a Set of Local Indistinguishable Orthogonal Product States
by Sainan Wang, Long Zhang, Zhiwei Sun, Daxin Dai and Kunchi Hou
Photonics 2023, 10(7), 807; https://doi.org/10.3390/photonics10070807 - 12 Jul 2023
Viewed by 752
Abstract
Quantum sealed-bid auction (QSA) is a special form of transaction with significant applications in the economic and financial fields. Using a unique set of locally indistinguishable orthogonal product (LIOP) states, we propose a new QSA protocol in this paper. In the protocol, the [...] Read more.
Quantum sealed-bid auction (QSA) is a special form of transaction with significant applications in the economic and financial fields. Using a unique set of locally indistinguishable orthogonal product (LIOP) states, we propose a new QSA protocol in this paper. In the protocol, the bid message is encoded as a quantum sequence of LIOP states, and the different particles of LIOP states are transmitted separately. Even though an attacker obtains a portion of the particles, they cannot recover the entire bid message because of the local indistinguishability of LIOP states. Once the auctioneer announces the winner’s bid, all bidders are able to confirm the authenticity of their bid. With the help of a semi-honest third party, collusion between the auctioneer and a malicious bidder can be discovered. Finally, our protocol is capable of meeting all requirements for secure sealed-bid auctions through security and completeness analysis. Additionally, the proposed protocol does not require any entangled resources and complicated operations, so it can be easily implemented in practice. Full article
(This article belongs to the Special Issue Quantum Communications: Technologies and Applications)
Show Figures

Figure 1

20 pages, 881 KiB  
Article
Quantum Secure Multi-Party Summation with Identity Authentication Based on Commutative Encryption
by Ning Wang, Xinying Tian, Xiaodong Zhang and Song Lin
Photonics 2023, 10(5), 558; https://doi.org/10.3390/photonics10050558 - 10 May 2023
Cited by 4 | Viewed by 1474
Abstract
In quantum secure multi-party summation protocols, some attackers can impersonate legitimate participants in the summation process, and easily steal the summation results from the participants. This is often overlooked for existing secure multi-party summation protocols, thus rendering them insecure. Based on commutative encryption, [...] Read more.
In quantum secure multi-party summation protocols, some attackers can impersonate legitimate participants in the summation process, and easily steal the summation results from the participants. This is often overlooked for existing secure multi-party summation protocols, thus rendering them insecure. Based on commutative encryption, a quantum secure multi-party summation protocol with identity authentication is proposed in this paper. In the protocol, each participant encodes a secret integer on photons via unitary operations. At the same time, a one-way hash function technique with a key is utilized to perform identity authentication operations for each participant. Finally, the summation is calculated with the help of a semi-trusted third party. The analysis of the protocol shows that the proposed protocol is correct and resistant to common and impersonation attacks. Compared to related protocols, the use and measurement of single photons makes the protocol easier to implement into existing technology. Furthermore, the simulation experiments on the IBM Q Experience cloud platform demonstrate the effectiveness of the presented protocol. Full article
(This article belongs to the Special Issue Quantum Communications: Technologies and Applications)
Show Figures

Figure 1

Back to TopTop