<<

. 9
( 9)



Intercept and resend, 73 Outer product, 8
Interferometer, 99
P
Pauli matrices, 6
J
PDAs, 176, 181
Jacknife residuals, 142
Penalized quasi-likelihood approach, 126
Jensen™s inequality, 42
Personal Digital Assistants, 181
Phase, 4
K Phase ¬‚ip, 6
Ket, 3 Photon number splitting, 100
Key Store, 156, 162, 182 Photon number splitting attack, 90
Kolmogorov“Smirnov, 128, 134 Pickup Stores, 163
Index 213

Plug and Play (PP), 98 Rejection method, 62
PNS, 90 Relative phase, 5
Point of Trust Architecture, 186 Renyi entropy, 72
Point-to-point model, 187 Resource-Oriented Setup of Communication,
Poissonian likelihood function, 55 187
Polarization encoding, 109 Routing, 167
Polarization ¬lter, 25 Royal Institute of Technology of Kista, 118
Potentially in sync, 165
PPP, 154
S
PQL, 126
SARG protocol, 117
Pre-shared secret, 45
Scalability, 204
Privacy Ampli¬cation, 40, 152
Scalar product, 7
Prohorov topology, 56
SECOQC, 97, 173
Public channel, 14, 27, 186
SECOQC Network Vienna 2008, 174
Secure Storage, 181
Q
Shannon entropy, 19, 72
QAN, 175
Sifting, 27, 152
QBB, 175
Single photon source, 103
QBER, 33, 111
SLIP, 154
QFT, 86
SmartPhones, 176, 181
QKD Gain, 45
Sources of Errors, 51
QKD network, 151
Spatial ¬lter, 113
QKD with Coherent States, 106
Speed-Oriented Setup of Communication, 191
QKD-NL, 167
Stochastic process, 59
QKD-TL, 168
Storage client, 209
QKeys, 176, 179
STORED keyword, 164
Q3P, 151, 155
Survey, 206
Q3P link, 156
Q3P node, 156
QR codes, 179 T
Quantum access node, 175 Target, 195, 199
Quantum backbone network, 175 TCP, 168
Quantum bit error rate, 33 Telemedicine, 205
Quantum Bits, 3 Tensor product, 9
Quantum channel, 14, 24, 186 THALES Research, 118
Quantum Fourier transformation, 86 Time, 195, 199
Quantum Key Distribution - Network Layer, Time-shift attack strategy, 93
167 Time-shift attacks, 111
Quantum Point-to-Point Protocol, 151, 155 Toshiba, 100
Quantum switching network, 153 Toshiba Research Europe Ltd., 117
Qubit, 3 Transport, 168
Qubit error rate (QBER), 123 Trojan Horse attack, 91
Trust Zone, 186
R
Trusted repeater QKD network, 153
R, 123
Two-photon source, 111
R´ nyi entropy, 20
e
Radio transmission, 179
U
Raw key, 27
Unitary transformation, 10
Real in sync, 165
Universal hashing, 14
Reconciliation, 31
Universit´ Libre de Bruxelles, 118
e
Reconciliation phase, 41
University of Bristol, 119
Reconciliation protocol, 35
University of Munich, 118
Reed-Solomon, 180
Reference ¬eld, 106 University of Vienna, 118
214 Index

V Weak coherent pulses, 89
Variance function, 125 Weak signal mode, 106

W X
WCP, 89 ZLG attack, 81

<<

. 9
( 9)