Security of Key Distribution and Complementarity in Quantum Mechanics
نویسنده
چکیده
• Quantum key distribution (BB84 protocol) • The goal of security proof • A very short course of quantum mechanics • Proving the security of QKD via complementarity • Basic idea • Small imperfections • A prescription for proving the security • The security of the BB84 protocol • Merits in the complementarity approach
منابع مشابه
Simple security proof of quantum key distribution based on complementarity
We present an approach to the unconditional security of quantum key distribution protocols based on a complementarity argument. The approach is applicable to, but not limited to, every case that has been treated via the argument by Shor and Preskill based on entanglement distillation, with a benefit of decoupling of the error correction from the privacy amplification. It can also treat cases wi...
متن کاملQuantum Mechanics and the Mechanism of Sexual Reproduction
There are many claims that quantum mechanics plays a key role in the origin and/or operation of biological organisms. The mechanism of the meiosis, mitosis and gametes life cycle from the view-point of quantum for human has been represented. The quantum gates have been used to simulate these processes for the first time. The reason of several hundred sperms has been explained in the male too
متن کاملQuantum Mechanics and the Mechanism of Sexual Reproduction
There are many claims that quantum mechanics plays a key role in the origin and/or operation of biological organisms. The mechanism of the meiosis, mitosis and gametes life cycle from the view-point of quantum for human has been represented. The quantum gates have been used to simulate these processes for the first time. The reason of several hundred sperms has been explained in the male too
متن کاملSecurity of Quantum Cryptography against Collective Attacks
We present strong attacks against quantum key distribution schemes which use quantum memories and quantum gates to attack directly the final key. We analyze a specific attack of this type, for which we find the density matrices available to the eavesdropper and the optimal information which can be extracted from them. We prove security against this attack and discuss security against any attack...
متن کاملA Simple Security Proof for Entanglement-Based Quantum Key Distribution
Quantum cryptography exploits the quantum mechanical properties of communication lines to enhance the security of the so-called key distribution. In this work, we explain the role played by quantum mechanics in cryptographic tasks and also investigate how secure is quantum cryptography. More importantly, we show by a simple security proof that for any state sent by the sender, the eavesdropper ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2009