EXPO2025 Quantum Key Distribution (QKD) Details
01 Weakness Delivers Strong Security Explanatory panel
When quantum computers become common, today’s codes will be easy to break. How can we protect our important information?
Quantum Key Distribution uses photons (tiny particles of light) to send keys. It only uses safe photons and ignores any that have been spied on. This way, even quantum computers can’t break the communication.Weak like a bubble, but strong because of it.
02 Delicate therefore Robust:Quantum Key Distribution contents
“This is a secret key made up of combinations of 0s and 1s.”
“Now, we will separate the 0s and 1s and send them inside soap bubbles.”
“Do you think they might break along the way? Let’s try and see!”
Start Experiment
“Push the button to break it.”
“Did many of them break?”
“The 0s and 1s broke along with the soap bubbles.”
“But the secret key was delivered. This is the mechanism of its strength.”
“Thank you for experimenting!
Please let the next person have a turn.”
03 Quantum Key Distribution Technology Overview Panel
Security in the Age of Quantum Computers. Quantum computers will soon have the power to instantly break today’s encryption methods.
Quantum Key Distribution (QKD) is a promising new technology that uses the unique properties of quantum physics to protect sensitive data and ensure absolute security.Explore how this amazing technology works—and step into the future of communication!
04 Quantum Key Distribution Technology Description Content
Long-distance and network services are realized by combining multiple quantum cryptography communication devices in ring or mesh configurations.
The system is designed to scale flexibly in response to market and technological evolution.
Examples of Expected Quantum Cryptography Communication Services:
Handling highly anonymous data such as financial information, genomic data, and government-related data.
If an attempt is made to eavesdrop on the quantum cryptographic key, the receiving device detects the interception.
Upon detection, quantum key distribution over the network is halted.
Key delivery is then rerouted through an alternative path.
Once it is confirmed that eavesdropping has ceased, key distribution resumes.
05 multiplicity Akinori Goto
This work is inspired by a fundamental characteristic of quantum cryptographic communication: observation irreversibly alters the quantum state. Any attempt at eavesdropping or interference leaves a trace, making secure transmission possible. At its core lies a notion of information and existence that remains undefined until witnessed—emerging only through interaction. By visualizing the physical forms of 0 and 1 and the shifting light that moves between them, the work explores the ambiguity preceding certainty and the coexistence of multiple overlapping possibilities—behaviors unique to the quantum world.
3D Printing Assistance|DMM.make
