Unconditional Security From Noisy Quantum Storage
نویسندگان
چکیده
منابع مشابه
Unconditional Security of a Quantum-key Storage Device
First implementations of Quantum-key Distribution Cryptosystems have shown the need to use a storage device on which to keep a copy of the key that such cryptosystems create and distribute between a pair of users. Such users must be able to access their device to take enough key to code and decode the messages they send each other over a public channel. Because of the importance of the key stor...
متن کاملUnconditional Security in Quantum Bit Commitment
The commitment of bits between two mutually distrustful parties is a powerful cryptographic primitive with which many cryptographic objectives can be achieved. It is widely believed that unconditionally secure quantum bit commitment is impossible due to quantum entanglement cheating, which is codified in a general impossibility theorem. Gaps in the proof of this impossibility theorem are found....
متن کاملAchieving Unconditional Security by Quantum Cryptography
Classical cryptography algorithms are based on mathematical functions. The robustness of a given cryptosystem is based essentially on the secrecy of its (private) key and the difficulty with which the inverse of its one-way function(s) can be calculated. Unfortunately, there is no mathematical proof that will establish whether it is not possible to find the inverse of a given one-way function. ...
متن کاملCryptography from noisy storage.
We show how to implement cryptographic primitives based on the realistic assumption that quantum storage of qubits is noisy. We thereby consider individual-storage attacks; i.e., the dishonest party attempts to store each incoming qubit separately. Our model is similar to the model of bounded-quantum storage; however, we consider an explicit noise model inspired by present-day technology. To il...
متن کاملUnconditional security of quantum key distribution over arbitrarily long distances
Quantum key distribution is widely thought to offer unconditional security in communication between two users. Unfortunately, a widely accepted proof of its security in the presence of source, device, and channel noises has been missing. This long-standing problem is solved here by showing that, given fault-tolerant quantum computers, quantum key distribution over an arbitrarily long distance o...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Information Theory
سال: 2012
ISSN: 0018-9448,1557-9654
DOI: 10.1109/tit.2011.2177772