Xiang-Bin Wang - Department of Physics, Tsinghua University, Beijing, China
Xiao-Long Hu - School of Physics, Sun Yat-sen University, Guangzhou, China
EPJ Quantum Technology is calling for submissions to our new topical collection on Secure Quantum Communication. Information security is an increasingly important topic. Based on principles of quantum mechanics, quantum communication can provide a method for two remote parties to share information-theoretic secure private key. As the mainstream of quantum communication research, quantum key distribution (QKD) can be implemented by existing mature technologies and give satisfactory key rates.
This topical collection focuses on theories and technologies of secure quantum communication. Its main goal is to bridge the gap between the theory and the practice of quantum communication. In this collection, we invite authors to submit original research or review articles on quantum communication theories, the practical security of quantum communication, and technologies in quantum communication systems. The editors are interested in articles which can help to improve the efficiency and the secure distance of practical quantum communication systems or to address security issues with imperfect devices in the real world.
Topics include, but are not limited to:
- Quantum communication
- Quantum key distribution
- Practical security
- Side channel security and attack
- Decoy-state method
- Measurement-device-independent QKD
- Device-independent QKD
- Quantum repeater
- Quantum network
- Quantum teleportation
Deadline: 1 July, 2023
Please refer to the journal’s Submission Guidelines for the preparation of the manuscript. Articles for this Collection should be submitted via our submission system, SNAPP. Upon submission please select the appropriate article type (i.e. Research, Review, Comment or Brief Report) and the special issue from the "Collection" drop-down menu under the "Details" tab.
The guest editors will oversee the editorial process. Accepted articles are published open access and automatically assigned to a volume and issue after the proofs are corrected. They will be accessible through the regular volume and issue, as well as collected online under their specific special issue tab.