A quantum cloning bound and application to quantum key distribution
نویسنده
چکیده
Quantum key distribution (QKD) was proposed nearly 30 years ago by Bennett and Brassard [1] as a way to generate and distribute cryptographic keys whose security is guaranteed by the laws of physics, and in particular inherent limitations of quantum physics, rather than assumed limitations of a potential adversary’s computational power. Since that time, especially in the last 15 years or so, generic security proofs increasingly able to handle the realities of practical QKD implementations have been proposed.
منابع مشابه
Gas contaminants capturing by gamma-carbonic anhydrase catalyst: A quantum chemical approach
In this paper, we used quantum chemical approach to shed light on the catalytic mechanism of γ-carbonic anhydrase (γ-CA) to convert carbon dioxide to bicarbonate ion. Density functional theory (DFT) using B3LYP and UB3LYP functional and three split-valance including 6-31G*, 6-311G** and 6-311++G** basis sets were used to calculate the details of electronic structure and electronic energy of act...
متن کاملSecurity bound of two-basis quantum-key-distribution protocols using qudits
We investigate the security bounds of quantum-cryptographic protocols using d-level systems. In particular, we focus on schemes that use two mutually unbiased bases, thus extending the Bennett-Brassard 1984 quantum-key-distribution scheme to higher dimensions. Under the assumption of general coherent attacks, we derive an analytic expression for the ultimate upper security bound of such quantum...
متن کاملGas contaminants capturing by gamma-carbonic anhydrase catalyst: A quantum chemical approach
In this paper, we used quantum chemical approach to shed light on the catalytic mechanism of γ-carbonic anhydrase (γ-CA) to convert carbon dioxide to bicarbonate ion. Density functional theory (DFT) using B3LYP and UB3LYP functional and three split-valance including 6-31G*, 6-311G** and 6-311++G** basis sets were used to calculate the details of electronic structure and electronic energy of act...
متن کاملQuantum cloning and key distribution with continuous variables
Quantum information with continuous variables is a paradigm which has attracted a growing interest lately, as a consequence of the prospect for high-rate quantum communication systems that may result from the use of standard telecommunication components. After introducing the concept of quantum continuous variables in optics, we turn to the fundamental impossibility of cloning continuous-variab...
متن کاملEfficient Computational Information Geometric Analysis of Physically Allowed Quantum Cloning Attacks for Quantum Key Distribution Protocols
In secret quantum communications the best eavesdropping attacks on quantum cryptography are based on imperfect cloning machines. The incoherent attack, based on quantum cloning, is the most common eavesdropping strategy. Using a probe, the eavesdropper imperfectly clones the sender’s quantum state which keeps one copy and sends the other. The physically allowed transformations of Eve’s quantum ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013