ID: quant-ph/0008064

Security of EPR-based Quantum Key Distribution

August 14, 2000

View on ArXiv

Similar papers 5

Quantum secure dialogue with quantum encryption

May 4, 2022

86% Match
Tian-Yu Ye
Quantum Physics

How to solve the information leakage problem has become the research focus of quantum dialogue. In this paper, in order to overcome the information leakage problem in quantum dialogue, a novel approach for sharing the initial quantum state privately between communicators, i.e., quantum encryption sharing, is proposed by utilizing the idea of quantum encryption. The proposed protocol uses EPR pairs as the private quantum key to encrypt and decrypt the traveling photons, which ...

Find SimilarView on arXiv

Unconditional Security In Quantum Key Distribution

May 22, 2012

86% Match
Horace P. Yuen
Quantum Physics

It has been widely claimed and believed that many protocols in quantum key distribution, especially the single-photon BB84 protocol, have been proved unconditionally secure at least in principle, for both asymptotic and finite protocols with realistic bit lengths. In this paper it is pointed out that the only known quantitative justification for such claims is based on incorrect assertions. The precise security requirements are described in terms of the attacker's sequence an...

Find SimilarView on arXiv

Estimates for practical quantum cryptography

June 2, 1998

86% Match
Norbert Lütkenhaus
Quantum Physics

In this article I present a protocol for quantum cryptography which is secure against attacks on individual signals. It is based on the Bennett-Brassard protocol of 1984 (BB84). The security proof is complete as far as the use of single photons as signal states is concerned. Emphasis is given to the practicability of the resulting protocol. For each run of the quantum key distribution the security statement gives the probability of a successful key generation and the probabil...

Find SimilarView on arXiv

SarDub19: An Error Estimation and Reconciliation Protocol

December 24, 2022

86% Match
Miralem Mehic, Harun Siljak
Cryptography and Security

Aside from significant advancements in the development of optical and quantum components, the performance of practical quantum key distribution systems is largely determined by the type and settings of the error key reconciliation procedure. It is realized through public channel and it dominates the communication complexity of the quantum key distribution process. The practical utilization significantly depends on the computational capacities that are of great importance in s...

Find SimilarView on arXiv

Quantum Cryptography with Imperfect Apparatus

September 15, 1998

85% Match
Dominic Princeton Mayers, Andrew Princeton Yao
Quantum Physics

Quantum key distribution, first proposed by Bennett and Brassard, provides a possible key distribution scheme whose security depends only on the quantum laws of physics. So far the protocol has been proved secure even under channel noise and detector faults of the receiver, but is vulnerable if the photon source used is imperfect. In this paper we propose and give a concrete design for a new concept, {\it self-checking source}, which requires the manufacturer of the photon so...

Find SimilarView on arXiv

Security of Trusted Repeater Quantum Key Distribution Networks

April 27, 2009

85% Match
Louis Salvail, Momtchil Peev, Eleni Diamanti, Romain Alleaume, ... , Laenger Thomas
Quantum Physics

A Quantum Key Distribution (QKD) network is an infrastructure capable of performing long-distance and high-rate secret key agreement with information-theoretic security. In this paper we study security properties of QKD networks based on trusted repeater nodes. Such networks can already be deployed, based on current technology. We present an example of a trusted repeater QKD network, developed within the SECOQC project. The main focus is put on the study of secure key agree...

Find SimilarView on arXiv

Quantum Cryptography in Noisy Channels

November 20, 1995

85% Match
Hoi-Kwong Lo, H. F. Chau
Quantum Physics

We provide a complete proof of the security of quantum cryptography against any eavesdropping attack including coherent measurements even in the presence of noise. Polarization-based cryptographic schemes are shown to be equivalent to EPR-based schemes. We also show that the performance of a noisy channel approaches that of a noiseless one as the error rate tends to zero. (i.e., the secrecy capacity $C_s (\epsilon) \to C_s (0)$ as $\epsilon \to 0$.) One implication of our res...

Find SimilarView on arXiv

A scheme for quantum communication using EPR pairs and local measurement

January 12, 2005

85% Match
Feng-Li Yan, Ting Gao
Quantum Physics

We present a scheme for quantum communication, where a set of EPR pairs, initially shared by the sender Alice and the receiver Bob, functions as a quantum channel. After insuring the safety of the quantum channel, Alice applies local measurement on her particles of the EPR pairs and informs Bob the encoding classical information publicly. According to Alice's classical information and his measurement outcomes on the EPR pairs Bob can infer the secret messages directly. In thi...

Find SimilarView on arXiv

Security of Quantum Key Distribution Against All Collective Attacks

January 12, 1998

85% Match
Eli Biham, Michel Boyer, Gilles Brassard, ... , Mor Tal
Quantum Physics

Security of quantum key distribution against sophisticated attacks is among the most important issues in quantum information theory. In this work we prove security against a very important class of attacks called collective attacks (under a compatible noise model) which use quantum memories and gates, and which are directed against the final key. Although attacks stronger than the collective attacks can exist in principle, no explicit example was found and it is conjectured t...

Find SimilarView on arXiv

Counterfactual Quantum Cryptography

September 23, 2008

85% Match
Tae-Gon Noh
Quantum Physics

Quantum cryptography allows one to distribute a secret key between two remote parties using the fundamental principles of quantum mechanics. The well-known established paradigm for the quantum key distribution relies on the actual transmission of signal particle through a quantum channel. This paper shows that the task of a secret key distribution can be accomplished even though a particle carrying secret information is not in fact transmitted through the quantum channel. The...

Find SimilarView on arXiv