December 12, 2005
Similar papers 4
November 26, 1997
This paper is withdrawn. See quant-ph/9806031 for a discussion.
February 15, 2018
Uniquely among the sciences, quantum cryptography has driven both foundational research as well as practical real-life applications. We review the progress of quantum cryptography in the last decade, covering quantum key distribution and other applications.
May 16, 2012
This paper is withdrawn. We study the quantum key distribution (QKD) protocol based on a quantum retrodiction protocol, namely the so-called mean king problem. The security is analyzed by considering the eavesdropping on both the preparation of the entangled pair and the transmission of the quantum state. This QKD protocol can generate efficiently a bit of raw key in every single run. We find that, for qubit system, it is more secure than the QKD Bennett-Brassard 1984 protoco...
May 11, 2002
A secret key shared through quantum key distribution between two cooperative players is secure against any eavesdropping attack allowed by the laws of physics. Yet, such a key can be established only when the quantum channel error rate due to eavesdropping or imperfect apparatus is low. Here, I report a practical quantum key distribution scheme making use of an adaptive privacy amplification procedure with two-way classical communication. Then, I prove that the scheme generat...
April 21, 2015
This is an overview of the state of the art for practical quantum key distribution (QKD) as of March 2015. It is written by a non-expert for non-experts. Additions and corrections are welcome.
February 3, 2004
This is a comment on PRL90(03)157901 by Antoni Wojcik (quant-ph/0211199)
February 17, 2009
Quantum key distribution (QKD) promises secure key agreement by using quantum mechanical systems. We argue that QKD will be an important part of future cryptographic infrastructures. It can provide long-term confidentiality for encrypted information without reliance on computational assumptions. Although QKD still requires authentication to prevent man-in-the-middle attacks, it can make use of either information-theoretically secure symmetric key authentication or computation...
December 4, 2007
Quantum key distribution is among the foremost applications of quantum mechanics, both in terms of fundamental physics and as a technology on the brink of commercial deployment. Starting from principal schemes and initial proofs of unconditional security for perfect systems, much effort has gone into providing secure schemes which can cope with numerous experimental imperfections unavoidable in real world implementations. In this paper, we provide a comparison of various sche...
December 1, 1997
This paper has been withdrawn. See quant-ph/9806031 for a discussion.
January 9, 2007
Recently Z. S. Zhang et al [Phys. Lett. A 356(2006)199] have proposed an one-way quantum identity authentication scheme and claimed that it can verify the user's identity and update securely the initial authentication key for reuse.