<?xml version="1.0" encoding="utf-8"?>
    <rss version="2.0">
      <channel xmlns:content="http://purl.org/rss/1.0/modules/content/">
        <title>Frontiers in Quantum Science and Technology | Quantum Communication section | New and Recent Articles</title>
        <link>https://www.frontiersin.org/journals/quantum-science-and-technology/sections/quantum-communication</link>
        <description>RSS Feed for Quantum Communication section in the Frontiers in Quantum Science and Technology journal | New and Recent Articles</description>
        <language>en-us</language>
        <generator>Frontiers Feed Generator,version:1</generator>
        <pubDate>2026-05-14T01:38:00.754+00:00</pubDate>
        <ttl>60</ttl>
        <item>
        <guid isPermaLink="true">https://www.frontiersin.org/articles/10.3389/frqst.2026.1704298</guid>
        <link>https://www.frontiersin.org/articles/10.3389/frqst.2026.1704298</link>
        <title><![CDATA[An improved quantum anonymous notification protocol for quantum-augmented networks]]></title>
        <pubdate>2026-05-13T00:00:00Z</pubdate>
        <category>Original Research</category>
        <author>Nitin Jha</author><author>Abhishek Parakh</author><author>Mahadevan Subramaniam</author>
        <description><![CDATA[Current quantum networks remain difficult to scale because quantum components are noisy, expensive, and resource constrained, which limits the practical security advantages they can provide over classical network infrastructure. Quantum-augmented networks address this challenge by selectively integrating quantum primitives into classical communication systems. Within this setting, quantum anonymous notification provides a way to inform a receiver of an incoming quantum communication without exposing unnecessary metadata. In this work, we propose an improved quantum anonymous notification protocol that uses rotation operations on shared Greenberger-Horne-Zeilinger states to generate anonymous notifications in an n-user quantum-augmented network. We evaluate the protocol under channel-noise conditions and compare its false-notification behavior with earlier notification approaches. The modified protocol shows improved resilience to false notifications under the considered noise model while preserving the anonymity goals of the notification process. We further discuss how this notification layer can support machine-learning-assisted quantum-augmented networks by enabling receivers to prepare for quantum-payload handling without relying on context-bearing packet headers. This reduces header-based information leakage and limits targeted interference at compromised switches, making anonymous notification a useful coordination layer for practical hybrid quantum-classical networks.]]></description>
      </item><item>
        <guid isPermaLink="true">https://www.frontiersin.org/articles/10.3389/frqst.2025.1575498</guid>
        <link>https://www.frontiersin.org/articles/10.3389/frqst.2025.1575498</link>
        <title><![CDATA[Quantum key distribution through quantum machine learning: a research review]]></title>
        <pubdate>2025-05-02T00:00:00Z</pubdate>
        <category>Mini Review</category>
        <author>Krupa Purohit</author><author>Ajay Kumar Vyas</author>
        <description><![CDATA[Quantum cryptography has emerged as a radical research field aimed at mitigating various security threats in modern communication systems. The integration of Quantum Machine Learning (QML) protocols plays a crucial role in enhancing security measures, addressing previously inaccessible threats, and improving cryptographic efficiency. Key research areas in quantum cryptography include Quantum Key Distribution (QKD), eavesdropping detection, QSDC, security analysis of QKD protocols, post-quantum cryptography, Quantum Network Security & Intrusion Detection, Quantum-secure communication beyond QKD, quantum random number generation, Quantum Secure Multi-Party Computation (QSMPC), Quantum Homomorphic Encryption (QHE), and privacy-preserving computation. QML algorithms improve the key generation of QKD, by improving quantum state selection and reducing measurements. This also allows them to increase efficiency because it identifies trends in errors and applies corrections, making quantum cryptography a more dependable option. With intelligent processing machine learning is excellent at handling complex, high-dimensional data-this may provide a viable strategy for enhancing QKD performance and increasingly real-world secure quantum communication networks. This review will explore current research gaps and future developments in QKD, security analysis of QKD protocols, and eavesdropping detection by leveraging various QML algorithms.]]></description>
      </item><item>
        <guid isPermaLink="true">https://www.frontiersin.org/articles/10.3389/frqst.2023.1182637</guid>
        <link>https://www.frontiersin.org/articles/10.3389/frqst.2023.1182637</link>
        <title><![CDATA[Measurement-device-independent multi-party quantum key agreement]]></title>
        <pubdate>2023-05-03T00:00:00Z</pubdate>
        <category>Original Research</category>
        <author>Bing-Xin Liu</author><author>Rui-Chen Huang</author><author>Yu-Guang Yang</author><author>Guang-Bao Xu</author>
        <description><![CDATA[Quantum key agreement (QKA) is an important quantum cryptography primitive. In a QKA protocol, two or more untrusted parties can agree on an identical key in such a way that they equally influence the key and no subset can decide it alone. However, in practical QKA, the imperfections of the participant’s detectors can be exploited to compromise the security and fairness of QKA. To remove all the detector-side-channel loopholes, a measurement-device-independent multi-party QKA protocol is proposed. The protocol exploits the post-selected GHZ states to generate a secure agreement key between legitimate participants, while ensuring the fairness of key agreement. Our protocol provides a new clue for the design of practical QKA protocols.]]></description>
      </item><item>
        <guid isPermaLink="true">https://www.frontiersin.org/articles/10.3389/frqst.2023.1164428</guid>
        <link>https://www.frontiersin.org/articles/10.3389/frqst.2023.1164428</link>
        <title><![CDATA[Deploying hybrid quantum-secured infrastructure for applications: When quantum and post-quantum can work together]]></title>
        <pubdate>2023-04-14T00:00:00Z</pubdate>
        <category>Perspective</category>
        <author>Aleksey K. Fedorov</author>
        <description><![CDATA[Most currently used cryptographic tools for protecting data are based on certain computational assumptions, which makes them vulnerable with respect to technological and algorithmic developments, such as quantum computing. One existing option to counter this potential threat is quantum key distribution, whose security is based on the laws of quantum physics. Quantum key distribution is secure against unforeseen technological developments. A second approach is post-quantum cryptography, which is a set of cryptographic primitives that are believed to be secure even against attacks with both classical and quantum computing technologies. From this perspective, this study reviews recent progress in the deployment of the quantum-secured infrastructure based on quantum key distribution, post-quantum cryptography, and their combinations. Various directions in the further development of the full-stack quantum-secured infrastructure are also indicated. Distributed applications, such as blockchains and distributed ledgers, are also discussed.]]></description>
      </item><item>
        <guid isPermaLink="true">https://www.frontiersin.org/articles/10.3389/frqst.2022.985276</guid>
        <link>https://www.frontiersin.org/articles/10.3389/frqst.2022.985276</link>
        <title><![CDATA[Theoretical development of discrete-modulated continuous-variable quantum key distribution]]></title>
        <pubdate>2022-10-13T00:00:00Z</pubdate>
        <category>Mini Review</category>
        <author>Wen-Bo Liu</author><author>Chen-Long Li</author><author>Zhi-Ping Liu</author><author>Min-Gang Zhou</author><author>Hua-Lei Yin</author><author>Zeng-Bing Chen</author>
        <description><![CDATA[Continuous-variable quantum key distribution offers simple, stable and easy-to-implement key distribution systems. The discrete modulation scheme further reduces the technical difficulty. The main regret is that the security of discrete modulation schemes has not been sufficiently demonstrated. Schemes with different signal state distributions use various physical conditions to obtain the key rate formula, resulting in different security levels, computation complexities and implementation difficulties. Therefore, a relatively systematic and logically consistent security proof against most general attacks is worth exploring. On the other hand, extending the discrete modulation scheme and its variants to different applications, such as satellite-to-earth communication, can further activate and advance this field. Here, we briefly review the achievements that have been made in discrete-modulated continuous-variable quantum key distribution, and openly discuss some issues worthy of further research.]]></description>
      </item><item>
        <guid isPermaLink="true">https://www.frontiersin.org/articles/10.3389/frqst.2022.985130</guid>
        <link>https://www.frontiersin.org/articles/10.3389/frqst.2022.985130</link>
        <title><![CDATA[Self-assisted deterministic hyperentangled-Bell-state analysis for polarization and double longitudinal momentum degrees of freedom of photon system]]></title>
        <pubdate>2022-10-05T00:00:00Z</pubdate>
        <category>Original Research</category>
        <author>Chang-Qi Yu</author><author>Zheng Zhang</author><author>Ji Qi</author><author>Bao-Cang Ren</author>
        <description><![CDATA[Hyperentangled state analysis is an important module in high-capacity quantum communication. We present a self-assisted deterministic hyperentangled-Bell-state analysis (HBSA) scheme for photon system entangled in three degrees of freedom (DOFs), where 64 polarization-double longitudinal momentum hyperentangled Bell states are completely distinguished. In this HBSA scheme, the four first longitudinal momentum Bell states are distinguished determinately by nondestructive first longitudinal momentum Bell state analyzer, which is constructed with cross-Kerr nonlinearity medium. The 16 second longitudinal momentum-polarization hyperentangled Bell states are distinguished determinately by self-assisted second longitudinal momentum-polarization hyperentangled Bell state analyzer using linear optical elements, where the first longitudinal momentum Bell state and time-bin entangled state are used as auxiliary. Using this self-assisted method, the application of nonlinear optical resource in HBSA scheme has been largely reduced, which makes this self-assisted deterministic HBSA scheme has potential application prospects in high-capacity quantum communication.]]></description>
      </item><item>
        <guid isPermaLink="true">https://www.frontiersin.org/articles/10.3389/frqst.2022.984638</guid>
        <link>https://www.frontiersin.org/articles/10.3389/frqst.2022.984638</link>
        <title><![CDATA[Detection of infrared light through stimulated four-wave mixing process]]></title>
        <pubdate>2022-08-25T00:00:00Z</pubdate>
        <category>Original Research</category>
        <author>Wei-Hang Zhang</author><author>Jing-Yuan Peng</author><author>En-Ze Li</author><author>Ying-Hao Ye</author><author>Lei Zeng</author><author>Ming-Xin Dong</author><author>Dong-Sheng Ding</author><author>Bao-Sen Shi</author>
        <description><![CDATA[Infrared optical measurement has a wide range of applications in industry and science, but infrared light detectors suffer from high costs and inferior performance than visible light detectors. Four-wave mixing (FWM) process allows detection in the infrared range by detecting correlated visible light. We experimentally investigate the stimulated FWM process in a hot 85Rb atomic vapor cell, in which a weak infrared signal laser at 1,530 nm induces the FWM process and is amplified and converted into a strong FWM light at 780 nm, the latter can be detected more easily. We find the optimized single- and two-photon detunings by studying the dependence of the frequency of input laser on the generated FWM light. What’s more, the power gain increases rapidly as the signal intensity decreases, which is consistent with our theoretical analysis. As a result, the power gain can reach up to 500 at a signal laser power of 0.1 μW and the number of detected photons increased by a factor of 250. Finally, we experimentally prove that our amplification process can work in a broad band in the frequency domain by exploring the response rate of our stimulated FWM process.]]></description>
      </item>
      </channel>
    </rss>