Efficient multiuser quantum cryptography network based on entanglement
نویسندگان
چکیده
We present an efficient quantum key distribution protocol with a certain entangled state to solve a special cryptographic task. Also, we provide a proof of security of this protocol by generalizing the proof of modified of Lo-Chau scheme. Based on this two-user scheme, a quantum cryptography network protocol is proposed without any quantum memory.
منابع مشابه
Deterministic and Efficient Three-party Quantum Key Distribution
The field of quantum computing is based on the laws of quantum mechanics, including states superposition and entanglement. Quantum cryptography is amongst the most surprising applications of quantum mechanics in quantum information processing. Remote state preparation allows a known state to a sender to be remotely prepared at a receiver’s location when they prior share entanglement and transmi...
متن کاملThe Impact of the Spectral Filter Bandwidth on the Spectral Entanglement and Indistinguishability of Photon Pairs of SPDC Process
In this paper, we have investigated the dependence of the spectral entanglement and indistinguishability of photon pairs produced by the spontaneous parametric down-conversion (SPDC) procedure on the bandwidth of spectral filters used in the detection setup. The SPDC is a three-wave mixing process which occurs in a nonlinear crystal and generates entangled photon pairs and utilizes as one of th...
متن کاملExperimental realization of an entanglement access network and secure multi-party computation
To construct a quantum network with many end users, it is critical to have a cost-efficient way to distribute entanglement over different network ends. We demonstrate an entanglement access network, where the expensive resource, the entangled photon source at the telecom wavelength and the core communication channel, is shared by many end users. Using this cost-efficient entanglement access net...
متن کاملDetecting Quantum Entanglement: Positive Maps and Entanglement Witnesses
The interest on quantum entanglement has dramatically increased during the last 2 decades due to the emerging field of quantum information theory. It turns out that quantum entanglement may be used as basic resources in quantum information processing and communication. The prominent examples are quantum cryptography, quantum teleportation, quantum error correction codes, and quantum computation...
متن کاملOn the Power and Usability of Quantum Cryptography
Threats and attacks to information on the digital network environment are growing rapidly; this puts extra pressure on individuals and business, as they will have to protect their privacy and intellectual property, then. Therefore, cryptographic security protocols have been developed to maintain privacy between communicating parties and to reduce the risk of malicious attacks. However, most of ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره 7 شماره
صفحات -
تاریخ انتشار 2017