Security of Key Distribution and Complementarity in Quantum Mechanics

نویسنده

  • Masato Koashi
چکیده

• Quantum key distribution (BB84 protocol) • The goal of security proof • A very short course of quantum mechanics • Proving the security of QKD via complementarity • Basic idea • Small imperfections • A prescription for proving the security • The security of the BB84 protocol • Merits in the complementarity approach

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Simple security proof of quantum key distribution based on complementarity

We present an approach to the unconditional security of quantum key distribution protocols based on a complementarity argument. The approach is applicable to, but not limited to, every case that has been treated via the argument by Shor and Preskill based on entanglement distillation, with a benefit of decoupling of the error correction from the privacy amplification. It can also treat cases wi...

متن کامل

Quantum Mechanics and the Mechanism of Sexual Reproduction

There are many claims that quantum mechanics plays a key role in the origin and/or operation of biological organisms. The mechanism of the meiosis, mitosis and gametes life cycle from the view-point of quantum for human has been represented. The quantum gates have been used to simulate these processes for the first time. The reason of several hundred sperms has been explained in the male too

متن کامل

Quantum Mechanics and the Mechanism of Sexual Reproduction

There are many claims that quantum mechanics plays a key role in the origin and/or operation of biological organisms. The mechanism of the meiosis, mitosis and gametes life cycle from the view-point of quantum for human has been represented. The quantum gates have been used to simulate these processes for the first time. The reason of several hundred sperms has been explained in the male too

متن کامل

Security of Quantum Cryptography against Collective Attacks

We present strong attacks against quantum key distribution schemes which use quantum memories and quantum gates to attack directly the final key. We analyze a specific attack of this type, for which we find the density matrices available to the eavesdropper and the optimal information which can be extracted from them. We prove security against this attack and discuss security against any attack...

متن کامل

A Simple Security Proof for Entanglement-Based Quantum Key Distribution

Quantum cryptography exploits the quantum mechanical properties of communication lines to enhance the security of the so-called key distribution. In this work, we explain the role played by quantum mechanics in cryptographic tasks and also investigate how secure is quantum cryptography. More importantly, we show by a simple security proof that for any state sent by the sender, the eavesdropper ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009