Quantum Cryptography
Systems
Theory Single
Photon Sources
Charles Bennett, IBM Research
Yorktown Heights, New York
www.research.ibm.com/people/b/bennetc
Gilles Brassard, University of Montreal
Montreal, Canada
www.iro.umontreal.ca/labs/theorique/index.html.en
Artur Ekert, University of Oxford
Oxford, England
www.qubit.org/people/artur/index.html
Daniel Gottesman, University of California at Berkeley
Berkeley, California
www.cs.berkeley.edu/~gottesma
Gregg Jaeger, Boston University
Boston, Massachusetts
people.bu.edu/jaeger
Andrew C. Yao, Princeton University
Princeton, New Jersey
www.cs.princeton.edu/~yao
What to Look For
Equipment and capabilities:
Electric, room-temperature single-photon sources
Gigahertz single-photon sources
Efficient sources of entangled photons
Gigahertz entangled-photon sources
Efficient room-temperature photon detectors
Gigahertz photon detectors
Quantum repeaters or relays
Gigahertz quantum repeaters
Multi-photon quantum cryptography
Implementations:
Gigabit-per-second point-to-point
Via satellite
On a network
On the Internet
Threat levels:
10-qubit quantum computer (practical quantum systems possible)
100-qubit quantum computer (large-scale within a decade)
1,000-qubit quantum computer (encryption codes compromised)
|