Quantum key distribution using a two-way quantum channel
نویسندگان
چکیده
منابع مشابه
Error tolerance of two-basis quantum key-distribution protocols using qudits and two-way classical communication
We investigate the error tolerance of quantum cryptographic protocols using d-level systems. In particular, we focus on prepare-and-measure schemes that use two mutually unbiased bases and a key-distillation procedure with two-way classical communication. For arbitrary quantum channels, we obtain a sufficient condition for secret-key distillation which, in the case of isotropic quantum channels...
متن کاملQuantum key distribution using quantum Faraday rotators.
We propose a new quantum key distribution (QKD) protocol based on the fully quantum mechanical states of Faraday rotators. The protocol is unconditionally secure against collective attacks for a multi-photon source of up to two photons on a noisy environment. It is also robust against impersonation attacks. The protocol may be implemented experimentally with the current spintronics technology o...
متن کاملKey distillation from quantum channels using two-way communication protocols
We provide a general formalism to characterize the cryptographic properties of quantum channels in the realistic scenario where the two honest parties employ prepare and measure protocols and the known two-way communication reconciliation techniques. We obtain a necessary and sufficient condition to distill a secret key using this type of schemes for Pauli qubit channels and generalized Pauli c...
متن کاملSide-channel-free quantum key distribution.
Quantum key distribution (QKD) offers the promise of absolutely secure communications. However, proofs of absolute security often assume perfect implementation from theory to experiment. Thus, existing systems may be prone to insidious side-channel attacks that rely on flaws in experimental implementation. Here we replace all real channels with virtual channels in a QKD protocol, making the rel...
متن کاملSecurity of quantum key distribution protocols using two-way classical communication or weak coherent pulses
A fundamental problem in cryptography is to enable two distant parties, traditionally called Alice and Bob, to communicate in absolute privacy, even in presence of an eavesdropper, Eve. It is a well known fact that a secret key, i.e., a randomly chosen bit string held by both Alice and Bob, but unknown to Eve, is sufficient to perform this task (one-time pad encryption). Thus, the problem of se...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Theoretical Computer Science
سال: 2014
ISSN: 0304-3975
DOI: 10.1016/j.tcs.2014.09.017