A quantum cloning bound and application to quantum key distribution

نویسنده

  • Erik Woodhead
چکیده

Quantum key distribution (QKD) was proposed nearly 30 years ago by Bennett and Brassard [1] as a way to generate and distribute cryptographic keys whose security is guaranteed by the laws of physics, and in particular inherent limitations of quantum physics, rather than assumed limitations of a potential adversary’s computational power. Since that time, especially in the last 15 years or so, generic security proofs increasingly able to handle the realities of practical QKD implementations have been proposed.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Gas contaminants capturing by gamma-carbonic anhydrase catalyst: A quantum chemical approach

In this paper, we used quantum chemical approach to shed light on the catalytic mechanism of γ-carbonic anhydrase (γ-CA) to convert carbon dioxide to bicarbonate ion. Density functional theory (DFT) using B3LYP and UB3LYP functional and three split-valance including 6-31G*, 6-311G** and 6-311++G** basis sets were used to calculate the details of electronic structure and electronic energy of act...

متن کامل

Security bound of two-basis quantum-key-distribution protocols using qudits

We investigate the security bounds of quantum-cryptographic protocols using d-level systems. In particular, we focus on schemes that use two mutually unbiased bases, thus extending the Bennett-Brassard 1984 quantum-key-distribution scheme to higher dimensions. Under the assumption of general coherent attacks, we derive an analytic expression for the ultimate upper security bound of such quantum...

متن کامل

Gas contaminants capturing by gamma-carbonic anhydrase catalyst: A quantum chemical approach

In this paper, we used quantum chemical approach to shed light on the catalytic mechanism of γ-carbonic anhydrase (γ-CA) to convert carbon dioxide to bicarbonate ion. Density functional theory (DFT) using B3LYP and UB3LYP functional and three split-valance including 6-31G*, 6-311G** and 6-311++G** basis sets were used to calculate the details of electronic structure and electronic energy of act...

متن کامل

Quantum cloning and key distribution with continuous variables

Quantum information with continuous variables is a paradigm which has attracted a growing interest lately, as a consequence of the prospect for high-rate quantum communication systems that may result from the use of standard telecommunication components. After introducing the concept of quantum continuous variables in optics, we turn to the fundamental impossibility of cloning continuous-variab...

متن کامل

Efficient Computational Information Geometric Analysis of Physically Allowed Quantum Cloning Attacks for Quantum Key Distribution Protocols

In secret quantum communications the best eavesdropping attacks on quantum cryptography are based on imperfect cloning machines. The incoherent attack, based on quantum cloning, is the most common eavesdropping strategy. Using a probe, the eavesdropper imperfectly clones the sender’s quantum state which keeps one copy and sends the other. The physically allowed transformations of Eve’s quantum ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013