Efficient multiuser quantum cryptography network based on entanglement

نویسندگان

  • Peng Xue
  • Kunkun Wang
  • Xiaoping Wang
چکیده

We present an efficient quantum key distribution protocol with a certain entangled state to solve a special cryptographic task. Also, we provide a proof of security of this protocol by generalizing the proof of modified of Lo-Chau scheme. Based on this two-user scheme, a quantum cryptography network protocol is proposed without any quantum memory.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Deterministic and Efficient Three-party Quantum Key Distribution

The field of quantum computing is based on the laws of quantum mechanics, including states superposition and entanglement. Quantum cryptography is amongst the most surprising applications of quantum mechanics in quantum information processing. Remote state preparation allows a known state to a sender to be remotely prepared at a receiver’s location when they prior share entanglement and transmi...

متن کامل

The Impact of the Spectral Filter Bandwidth on the Spectral Entanglement and Indistinguishability of Photon Pairs of SPDC Process

In this paper, we have investigated the dependence of the spectral entanglement and indistinguishability of photon pairs produced by the spontaneous parametric down-conversion (SPDC) procedure on the bandwidth of spectral filters used in the detection setup. The SPDC is a three-wave mixing process which occurs in a nonlinear crystal and generates entangled photon pairs and utilizes as one of th...

متن کامل

Experimental realization of an entanglement access network and secure multi-party computation

To construct a quantum network with many end users, it is critical to have a cost-efficient way to distribute entanglement over different network ends. We demonstrate an entanglement access network, where the expensive resource, the entangled photon source at the telecom wavelength and the core communication channel, is shared by many end users. Using this cost-efficient entanglement access net...

متن کامل

Detecting Quantum Entanglement: Positive Maps and Entanglement Witnesses

The interest on quantum entanglement has dramatically increased during the last 2 decades due to the emerging field of quantum information theory. It turns out that quantum entanglement may be used as basic resources in quantum information processing and communication. The prominent examples are quantum cryptography, quantum teleportation, quantum error correction codes, and quantum computation...

متن کامل

On the Power and Usability of Quantum Cryptography

Threats and attacks to information on the digital network environment are growing rapidly; this puts extra pressure on individuals and business, as they will have to protect their privacy and intellectual property, then. Therefore, cryptographic security protocols have been developed to maintain privacy between communicating parties and to reduce the risk of malicious attacks. However, most of ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره 7  شماره 

صفحات  -

تاریخ انتشار 2017