Unconditionally secure device-independent quantum key distribution with only two devices

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Unconditionally secure device-independent quantum key distribution with only two devices

Jonathan Barrett, ∗ Roger Colbeck, † and Adrian Kent 4, ‡ Royal Holloway, University of London, Egham Hill, Egham TW20 0EX, U.K. Institute for Theoretical Physics, ETH Zurich, 8093 Zurich, Switzerland. Centre for Quantum Information and Foundations, DAMTP, Centre for Mathematical Sciences, University of Cambridge, Wilberforce Road, Cambridge, CB3 0WA, U.K. Perimeter Institute for Theoretical Ph...

متن کامل

Unconditionally Secure Multipartite Quantum Key Distribution

We consider the problem of secure key distribution among n trustful agents: the goal is to distribute an identical random bit-string among the n agents over a noisy channel such that eavesdroppers learn little about it. We study the general situation where the only resources required are secure bipartite key distribution and authenticated classical communication. Accordingly, multipartite quant...

متن کامل

Device-independent quantum key distribution

Quantum key distribution allows two parties connected by a quantum channel to establish a secret key that is unknown to any unauthorized third party. The secrecy of this key is based on the laws of quantum physics. For security, however, it is crucial that the honest parties are able to control their physical devices accurately and completely. The goal of device-independent quantum key distribu...

متن کامل

Unconditionally Secure Quantum Key Distribution In Higher Dimensions

In search of a quantum key distribution scheme that could stand up for more drastic eavesdropping attack, I discover a prepare-and-measure scheme using N -dimensional quantum particles as information carriers where N is a prime power. Using the Shor-Preskill-type argument, I prove that this scheme is unconditional secure against all attacks allowed by the laws of quantum physics. Incidentally, ...

متن کامل

Unconditionally secure key distribution based on two nonorthogonal states.

We prove the unconditional security of the Bennett 1992 protocol, by using a reduction to an entanglement distillation protocol initiated by a local filtering process. The bit errors and the phase errors are correlated after the filtering, and we can bound the amount of phase errors from the observed bit errors by an estimation method involving nonorthogonal measurements. The angle between the ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Physical Review A

سال: 2012

ISSN: 1050-2947,1094-1622

DOI: 10.1103/physreva.86.062326