Unconditional security of a K-state quantum key distribution protocol

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Unconditional security of quantum key distribution over arbitrarily long distances

Quantum key distribution is widely thought to offer unconditional security in communication between two users. Unfortunately, a widely accepted proof of its security in the presence of source, device, and channel noises has been missing. This long-standing problem is solved here by showing that, given fault-tolerant quantum computers, quantum key distribution over an arbitrarily long distance o...

متن کامل

Unconditional security of quantum key distribution and the uncertainty principle

An approach to the unconditional security of quantum key distribution protocols is presented, which is based on the uncertainty principle. The approach applies to every case that has been treated via the argument by Shor and Preskill, but it is not necessary to find quantum error correcting codes. It can also treat the cases with uncharacterized apparatuses. The proof can be applied to cases wh...

متن کامل

Proof of unconditional security of six-state quantum key distribution scheme

We prove the unconditional security of the standard six-state scheme for quantum key distribution (QKD). We demonstrate its unconditional security up to a bit error rate of 12.7 percents, by allowing only one-way classical communications in the error correction/privacy ampli cation procedure between Alice and Bob. This shows a clear advantage of the six-state scheme over another standard scheme...

متن کامل

Unconditional Security of a Quantum-key Storage Device

First implementations of Quantum-key Distribution Cryptosystems have shown the need to use a storage device on which to keep a copy of the key that such cryptosystems create and distribute between a pair of users. Such users must be able to access their device to take enough key to code and decode the messages they send each other over a public channel. Because of the importance of the key stor...

متن کامل

Security proof of a three-state quantum key distribution protocol without rotational symmetry

Standard security proofs of quantum key distribution (QKD) protocols often rely on symmetry arguments. In this paper, we prove the security of a three-state protocol that does not possess rotational symmetry. The three-state QKD protocol we consider involves three qubit states, where the first two states, |0z〉 and |1z〉, can contribute to key generation and the third state, |+〉 = (|0z〉 + |1z〉)/ ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Quantum Information Processing

سال: 2018

ISSN: 1570-0755,1573-1332

DOI: 10.1007/s11128-018-1998-3