Quantum key distribution using a two-way quantum channel

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Error tolerance of two-basis quantum key-distribution protocols using qudits and two-way classical communication

We investigate the error tolerance of quantum cryptographic protocols using d-level systems. In particular, we focus on prepare-and-measure schemes that use two mutually unbiased bases and a key-distillation procedure with two-way classical communication. For arbitrary quantum channels, we obtain a sufficient condition for secret-key distillation which, in the case of isotropic quantum channels...

متن کامل

Quantum key distribution using quantum Faraday rotators.

We propose a new quantum key distribution (QKD) protocol based on the fully quantum mechanical states of Faraday rotators. The protocol is unconditionally secure against collective attacks for a multi-photon source of up to two photons on a noisy environment. It is also robust against impersonation attacks. The protocol may be implemented experimentally with the current spintronics technology o...

متن کامل

Key distillation from quantum channels using two-way communication protocols

We provide a general formalism to characterize the cryptographic properties of quantum channels in the realistic scenario where the two honest parties employ prepare and measure protocols and the known two-way communication reconciliation techniques. We obtain a necessary and sufficient condition to distill a secret key using this type of schemes for Pauli qubit channels and generalized Pauli c...

متن کامل

Side-channel-free quantum key distribution.

Quantum key distribution (QKD) offers the promise of absolutely secure communications. However, proofs of absolute security often assume perfect implementation from theory to experiment. Thus, existing systems may be prone to insidious side-channel attacks that rely on flaws in experimental implementation. Here we replace all real channels with virtual channels in a QKD protocol, making the rel...

متن کامل

Security of quantum key distribution protocols using two-way classical communication or weak coherent pulses

A fundamental problem in cryptography is to enable two distant parties, traditionally called Alice and Bob, to communicate in absolute privacy, even in presence of an eavesdropper, Eve. It is a well known fact that a secret key, i.e., a randomly chosen bit string held by both Alice and Bob, but unknown to Eve, is sufficient to perform this task (one-time pad encryption). Thus, the problem of se...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Theoretical Computer Science

سال: 2014

ISSN: 0304-3975

DOI: 10.1016/j.tcs.2014.09.017