Provably secure experimental quantum bit-string generation.

نویسندگان

  • L P Lamoureux
  • E Brainis
  • D Amans
  • J Barrett
  • S Massar
چکیده

Coin tossing is a cryptographic task in which two parties who do not trust each other aim to generate a common random bit. Using classical communication this is impossible, but nontrivial coin tossing is possible using quantum communication. Here we consider the case when the parties do not want to toss a single coin, but many. This is called bit-string generation. We report the experimental generation of strings of coins which are provably more random than achievable using classical communication. The experiment is based on the "plug and play" scheme developed for quantum cryptography, and therefore well suited for long distance quantum communication.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC

Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...

متن کامل

Provably secure and high-rate quantum key distribution with time-bin qudits

The security of conventional cryptography systems is threatened in the forthcoming era of quantum computers. Quantum key distribution (QKD) features fundamentally proven security and offers a promising option for quantum-proof cryptography solution. Although prototype QKD systems over optical fiber have been demonstrated over the years, the key generation rates remain several orders of magnitud...

متن کامل

Artemia: a family of provably secure authenticated encryption schemes

Authenticated encryption schemes establish both privacy and authenticity. This paper specifies a family of the dedicated authenticated encryption schemes, Artemia. It is an online nonce-based authenticated encryption scheme which supports the associated data. Artemia uses the permutation based mode, JHAE, that is provably secure in the ideal permutation model. The scheme does not require the in...

متن کامل

v 1 1 1 Ja n 20 04 Unconditionally Secure Quantum m - out - of - n Oblivious Transfer ∗

Quantum cryptography is one example of applying a deep understanding of quantum physics to create a novel technology of potentially enormous significance. Oblivious Transfer (OT) is used as a key component in many applications of cryptography. Crépeau showed the first quantum 1-out-of-2 oblivious transfer in 1994 based on the transmission of polarized light and the exist of secure quantum bit c...

متن کامل

eb 2 00 4 Unconditionally Secure Quantum m - out - of - n Oblivious Transfer ∗

Quantum cryptography is one example of applying a deep understanding of quantum physics to create a novel technology of potentially enormous significance. Oblivious Transfer (OT) is used as a key component in many applications of cryptography. Crépeau showed the first quantum 1-out-of-2 oblivious transfer in 1994 based on the transmission of polarized light and the exist of secure quantum bit c...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Physical review letters

دوره 94 5  شماره 

صفحات  -

تاریخ انتشار 2005