Day 1
What is quantum communication about?
Qubit and quantum register
IBM Quantum
How to prepare a superposition?
- Preparing an arbitrary quantum state
No cloning theorem
- No Cloning Theorem - Proof
Entanglement
- Decomposition exercise
- Entangled states
- Difference between product and entangled states
- What does entanglement mean?
- Famous entanglement pairs
- How to produce entangled pairs?
- Changing the bases of an entangled pair
- CNOT gate
- Bell state generator
- Generalized quantum entangler
- How to create entangled qubits physically? - An example
Implementation examples for qubits
- Physical qubits
- Di Vincenzo criteria
- Superconducting qubits
- Trapped ions
- Photonic qubits
Day 2
Quantum key distribution over optical fiber
- From theory to the real world
- Protocol stack of QKD
Two important quantum communication protocols
- Quantum Communication – the players
- Superdense coding
- Teleportation
- Superdense coding and Teleportation
Quantum Medium Access Control
- Medium Access Control in distributed environment - quantum WIFI
- Quantum WIFI - MAC
- Quantum MAC - JOIN
- Quantum MAC - LEAVE
- Quantum MAC - TRANSFER
- Quantum MAC - generalization
- Rebalacing
- Quantum periodic table
Density matrix and its application in quantum communications
- Decomposition exercise
- Introduction to density matrix formalism
- Calculation of density matrices
- Mixed states
- Geometrical representation
- Are density matrices unique?
- Partial trace
- Postulates with density matrices
- Teleportation
- State vs. density matrix formalisms
Why do we need quantum key distribution?
- Problem formulation
- Symmetric Keys
- Symmetric Keys – problems and solutions
- Asymmetric Key System
- Problem formulation
- Problem formulation – Quantum Key Distribution
Quantum key distribution approaches
- Two types of QKD
- In real life, quantum channel is not ideal
- BB84, the first QKD protocol
- SARG04 protocols
- B92 protocol
- Entanglement based QKD
- E91 protocol
Passive and active attacks
- Passive attack
- Active attack
- Attack types
- Denial of service attack
- Man-in-the-middle attack
Day 3
Non idealistic channels
- Why realistic quantum channels are important?
- General model of communication
- AWGN
- Channel capacity
- A suprising example
- Various quantum capacities
- Basic quantum channel models
- Effects in real fibers
Interesting QKD approaches
- Chicago Quantum Exchange
- Chinese Quantum Network: More than 4600 kilometers
- UK Quantum Communications Hub
- EuroQCI
- Companies: ID Quantique
- Companies: MagiQ
- Companies: Quintessence Labs
Technical study: implementing BB84
- High level overview
- Physical realization
Quantum key distribution via free-space
- Why to use free-space instead of fiber-based solution?
Errors in free-space quantum channels
- Quantum signals on free-space channels
- There are equations behind everything
- But this is what is important
Prepare-and-measure QKD vs entanglement-based QKD
- Prepare-and-measure QKD -advantages
- Prepare-and-measure QKD -disadvantages
- Entanglement-based QKD -advantages
- Entanglement-based QKD -disadvantages
Physical attacks on quantum key distribution protocols
- Intercept and resend
- Faked states attack
- Photon number splitting attack
- Trojan Horse Attack (Light Injection Attack)
- Using a beam splitter
Interesting free-space QKD approaches
- Scenarios for satellite based quantum communicatoins
- How to use an entanglement-based satellite system?
- Quantum Experiments at Space Scale (QUESS)
- Singapore’s mission in 2019
- SpooQy 1
- European answer: SAGA
- A draft concept of the European SAGA system
- Timeline for the SpaceQCI (from European Comission)
- Timeline for the SAGA mission (from ESA)
- Security threats to a satellite QKD system
Quantum Secure Network, Quantum Information Network
- Stages to achieve a global quantum internet
Ingredients of future's quantum internet
- Challenges
- Entanglement swapping
- Entanglement swapping - remarks
- Routing
Overview of standardization
- Working on standards
- Working on quantum communications standards
- ETSI Quantum-Safe Cryptography (QSC) working group
- ETSI - Quantum-Safe Cryptography (QSC)
- ETSI Industry Specification Group (ISG)
- ETSI QKD
- ETSI Standards – An example
- IETF QIRG – Standards for quantum internet
- IETF QIRG – Two dradts
Quantum communication: implementation challenges
- Technical study: implementing CV-QKD system
A Hungarian CV-QKD system
- Technical study: implementing quantum random number generator (QRNG)
The simplest QRNG
Summary and outlook
- Future's satellite system
- QKD and autonomous vehicles
- QKD and 5G