ID: quant-ph/0008064

Security of EPR-based Quantum Key Distribution

August 14, 2000

View on ArXiv

Similar papers 2

Practical Scheme To Share A Secret Key Through An Up To 27.6% Bit Error Rate Quantum Channel

May 11, 2002

87% Match
H. F. Chau
Quantum Physics

A secret key shared through quantum key distribution between two cooperative players is secure against any eavesdropping attack allowed by the laws of physics. Yet, such a key can be established only when the quantum channel error rate due to eavesdropping or imperfect apparatus is low. Here, I report a practical quantum key distribution scheme making use of an adaptive privacy amplification procedure with two-way classical communication. Then, I prove that the scheme generat...

Find SimilarView on arXiv

Fundamental And Practical Problems of QKD Security - the Actual and the Perceived Situation

September 6, 2011

87% Match
Horace P. Yuen
Quantum Physics

It is widely believed that quantum key distribution (QKD) has been proved unconditionally secure for realistic models applicable to various current experimental schemes. Here we summarize briefly why this is not the case, from both the viewpoints of fundamental quantitative security and applicable models of security analysis, with some morals drawn.

Find SimilarView on arXiv

Quantum oblivious transfer protocols based on EPR states

May 24, 1995

87% Match
M. Ardehali
Quantum Physics

We describe efficient protocols for quantum oblivious transfer and for one-out-of-two quantum oblivious transfer. These protocols, which can be implemented with present technology, are secure against general attacks as long as the cheater can not store the bit for an arbitrarily long period of time.

Find SimilarView on arXiv

Vulnerabilities in Quantum Key Distribution Protocols

May 14, 2003

87% Match
D. Richard Kuhn
Quantum Physics

Recently proposed quantum key distribution protocols are shown to be vulnerable to a classic man-in-the-middle attack using entangled pairs created by Eve. It appears that the attack could be applied to any protocol that relies on manipulation and return of entangled qubits to create a shared key. The protocols that are cryptanalyzed in this paper were proven secure with respect to some eavesdropping approaches, and results reported here do not invalidate these proofs. Rather...

Find SimilarView on arXiv

Reconciliation for Practical Quantum Key Distribution with BB84 protocol

February 16, 2020

87% Match
Nedra Benletaief, Houria Rezig, Ammar Bouallegue
Cryptography and Security

This paper investigates a new information reconciliation method for quantum key distribution in the case where two parties exchange key in the presence of a malevolent eavesdropper. We have observed that reconciliation is a special case of channel coding and for that existing techniques can be adapted for reconciliation. We describe an explicit reconciliation method based on Turbo codes. We believe that the proposed method can improve the efficiency of quantum key distributio...

Find SimilarView on arXiv

Quantum key distribution with authentication

December 10, 1998

86% Match
Guihua Zeng, Xinmei Wang
Quantum Physics

The security of the previous quantum key distribution (QKD) protocols, which is guaranteed by the nature of physics law, is based on the legitimate users. However, impersonation of the legitimate communicators by eavesdroppers, in practice, will be inevitable. In fact, the previous QKD protocols is unsecure without authentication in practical communication. In this paper, we proposed an improved QKD protocol that can simultaneously distribute the quantum secret key and verify...

Find SimilarView on arXiv

Security Bounds for Quantum Cryptography with Finite Resources

June 1, 2008

86% Match
Valerio Scarani, Renato Renner
Quantum Physics

A practical quantum key distribution (QKD) protocol necessarily runs in finite time and, hence, only a finite amount of communication is exchanged. This is in contrast to most of the standard results on the security of QKD, which only hold in the limit where the number of transmitted signals approaches infinity. Here, we analyze the security of QKD under the realistic assumption that the amount of communication is finite. At the level of the general formalism, we present new ...

Find SimilarView on arXiv

A Quantum Cryptographic Protocol with Detection of Compromised Server

November 13, 2003

86% Match
D. Richard Kuhn
Quantum Physics

This paper presents a hybrid cryptographic protocol, using quantum and classical resources, to generate a key for authentication and optionally for encryption in a network. One or more trusted servers distribute streams of entangled photons to individual resources that seek to communicate. An important class of cheating by a compromised server will be detected.

Find SimilarView on arXiv

Recent developments in quantum key distribution: theory and practice

December 4, 2007

86% Match
Wolfgang Mauerer, Wolfram Helwig, Christine Silberhorn
Quantum Physics

Quantum key distribution is among the foremost applications of quantum mechanics, both in terms of fundamental physics and as a technology on the brink of commercial deployment. Starting from principal schemes and initial proofs of unconditional security for perfect systems, much effort has gone into providing secure schemes which can cope with numerous experimental imperfections unavoidable in real world implementations. In this paper, we provide a comparison of various sche...

Find SimilarView on arXiv

Quantum Cryptography: Quantum Key Distribution, a Non-technical Approach

November 9, 2022

86% Match
Andrew Frigyik
Popular Physics
Information Theory
Information Theory

With the rapid development of quantum computers the currently secure cryptographic protocols may not stay that way. Quantum mechanics provides means to create an inherently secure communication channel that is protected by the laws of physics and not by the computational hardness of certain mathematical problems. This paper is a non-technical overview of quantum key distribution, one of the most well-known application of quantum cryptography, a type of cryptography poised to ...

Find SimilarView on arXiv