gptkbp:instance_of
|
gptkb:Quantum_Computing
|
gptkbp:applies_to
|
gptkb:crypt
|
gptkbp:based_on
|
gptkb:Quantum_Mechanics
|
gptkbp:can_be_used_for
|
key distribution protocols
|
gptkbp:collaborated_with
|
research institutions
|
gptkbp:developed_by
|
gptkb:Gilles_Brassard
gptkb:Charles_Bennett
|
gptkbp:ensures
|
secure communication
|
gptkbp:has_applications_in
|
secure communications
|
gptkbp:has_influenced
|
subsequent quantum key distribution protocols
|
https://www.w3.org/2000/01/rdf-schema#label
|
Bennett's quantum key distribution
|
gptkbp:involves
|
Alice and Bob
eavesdropper (Eve)
|
gptkbp:is_adopted_by
|
commercial applications
|
gptkbp:is_analyzed_in
|
theoretical studies
|
gptkbp:is_applied_in
|
banking security
|
gptkbp:is_based_on
|
no-cloning theorem
|
gptkbp:is_challenged_by
|
technological limitations
quantum hacking
|
gptkbp:is_compared_to
|
classical key distribution methods
|
gptkbp:is_considered_as
|
a breakthrough in cryptography
|
gptkbp:is_described_as
|
gptkb:textbooks
|
gptkbp:is_discussed_in
|
gptkb:literature
|
gptkbp:is_enhanced_by
|
quantum repeaters
quantum entanglement distillation
|
gptkbp:is_evaluated_by
|
performance metrics
security proofs
|
gptkbp:is_explored_in
|
gptkb:academic_research
simulations
philosophical discussions
government projects
|
gptkbp:is_facilitated_by
|
quantum networks
|
gptkbp:is_implemented_in
|
optical fibers
free space
polarization states
phase states
|
gptkbp:is_integrated_with
|
other cryptographic techniques
|
gptkbp:is_part_of
|
gptkb:quantum_cryptography
future quantum technologies
quantum communication systems
|
gptkbp:is_promoted_by
|
gptkb:educational_programs
quantum computing advocates
|
gptkbp:is_related_to
|
gptkb:Bell's_theorem
|
gptkbp:is_studied_in
|
quantum information theory
|
gptkbp:is_subject_to
|
gptkb:regulations
|
gptkbp:is_supported_by
|
government funding
international collaborations
quantum technologies
|
gptkbp:is_tested_for
|
laboratory settings
real-world attacks
|
gptkbp:is_used_for
|
data protection
|
gptkbp:is_used_in
|
secure key exchange
|
gptkbp:is_utilized_in
|
secure voting systems
|
gptkbp:is_vulnerable_to
|
eavesdropping
|
gptkbp:presented_by
|
conferences
|
gptkbp:provides
|
information-theoretic security
|
gptkbp:requires
|
quantum channel
|
gptkbp:uses
|
quantum bits (qubits)
|
gptkbp:utilizes
|
entanglement
|
gptkbp:was_a_demonstration_of
|
experiments
|
gptkbp:year_created
|
gptkb:1984
|
gptkbp:bfsParent
|
gptkb:Charles_Bennett
|
gptkbp:bfsLayer
|
4
|