Universality and The Criterion d in Quantum Key Generation

نویسنده

  • Horace P. Yuen
چکیده

The common security criterion d in quantum key distribution is taken to solve the universal composability problem in quantum key distribution as well as providing good general quantitative security guarantee. In this paper it is shown that these are a result of an invalid interpretation of d. The general security significance of d is analyzed in detail. The related issues of universality and attacker’s side information are discussed.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

1 Finite-size scaling study of the d = 4 site-diluted Ising model ∗.

If a pure system has a specific heat exponent α > 0 the Universality Class changes when the dilution is introduced in the model (Harris criterion [1]), while it remains unchanged if α < 0 (i.e. the Universality Class is that of the pure model). In the Ising model in 4 (or 2) dimensions α = 0 and the Harris criterion does not apply. Perturbative renormalization group (PRG) computations for d = 4...

متن کامل

High order perturbation study of the frustrated quantum Ising chain

In this paper, using high order perturbative series expansion method, the critical exponents of the order parameter and susceptibility in transition from ferromagnetic to disordered phases for 1D quantum Ising model in transverse field, with ferromagnetic nearest neighbor and anti-ferromagnetic next to nearest neighbor interactions, are calculated. It is found that for small value of the frustr...

متن کامل

ar X iv : q ua nt - p h / 01 02 14 0 v 1 2 7 Fe b 20 01 ENCODED UNIVERSALITY IN PHYSICAL IMPLEMENTATIONS OF A QUANTUM COMPUTER

We revisit the question of universality in quantum computing and propose a new paradigm. Instead of forcing a physical system to enact a predetermined set of universal gates (e.g., single-qubit operations and CNOT), we focus on the intrinsic ability of a system to act as a universal quantum computer using only its naturally available interactions. A key element of this approach is the realizati...

متن کامل

Quantum-locked key distribution at nearly the classical capacity rate.

Quantum data locking is a protocol that allows for a small secret key to (un)lock an exponentially larger amount of information, hence yielding the strongest violation of the classical one-time pad encryption in the quantum setting. This violation mirrors a large gap existing between two security criteria for quantum cryptography quantified by two entropic quantities: the Holevo information and...

متن کامل

External Factors Affecting Second Language Motivation: The Role of Teacher Burnout and Family Influence

Motivation can be conceptualized as a dynamic process which is a key contributor to mastering a second language. This study used the L2-Motivational Self System as the basis for a conceptual framework for studying the effects of external factors on learners' motivation. In particular, the role of teachers and parents was studied as the external facets of predicting learners' motivation. One hun...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009