| Quantum Cryptography
 Systems 
              Theory   Single 
            Photon Sources
 
 Charles Bennett, IBM Research
 Yorktown Heights, New York
 www.research.ibm.com/people/b/bennetc
 
 Gilles Brassard, University of Montreal
 Montreal, Canada
 www.iro.umontreal.ca/labs/theorique/index.html.en
 
 Artur Ekert, University of Oxford
 Oxford, England
 www.qubit.org/people/artur/index.html
 
 Daniel Gottesman, University of California at Berkeley
 Berkeley, California
 www.cs.berkeley.edu/~gottesma
 
 Gregg Jaeger, Boston University
 Boston, Massachusetts
 people.bu.edu/jaeger
 
 Andrew C. Yao, Princeton University
 Princeton, New Jersey
 www.cs.princeton.edu/~yao
 
 
 What to Look For
 
 Equipment and capabilities:
 
 Electric, room-temperature single-photon sources
 Gigahertz single-photon sources
 Efficient sources of entangled photons
 Gigahertz entangled-photon sources
 Efficient room-temperature photon detectors
 Gigahertz photon detectors
 Quantum repeaters or relays
 Gigahertz quantum repeaters
 Multi-photon quantum cryptography
 
 Implementations:
 
 Gigabit-per-second point-to-point
 Via satellite
 On a network
 On the Internet
 
 Threat levels:
 
 10-qubit quantum computer (practical quantum systems possible)
 100-qubit quantum computer (large-scale within a decade)
 1,000-qubit quantum computer (encryption codes compromised)
 
 
 
 |