Updating Quantum Cryptography Report ver. 1
نویسندگان
چکیده
Donna Dodson (NIST), Mikio Fujiwara (NICT), Philippe Grangier (CNRS), Masahito Hayashi (Tohoku University), Kentaro Imafuku (AIST), Ken-ichi Kitayama (Osaka University), Prem Kumar (Northwestern University), Christian Kurtsiefer (National University of Singapore), Gaby Lenhart (ETSI), Norbert Lütkenhaus (University of Waterloo), Tsutomu Matsumoto (Yokohama National University), William J. Munro (Hewlett-Packard Laboratories), Tsuyoshi Nishioka (Mitsubishi Electric), Momtchil Peev (Austrian Research Center), Masahide Sasaki (NICT), Yutaka Sata (Toshiba Research Europe), Atsushi Takada (NTT), Masahiro Takeoka (NICT), Kiyoshi Tamaki (NTT), Hidema Tanaka (NICT), Yasuhiro Tokura (NTT), Akihisa Tomita (NEC), Morio Toyoshima (NICT), Rodney van Meter (Keio University), Atsuhiro Yamagishi (IPA), Yoshihisa Yamamoto (Stanford University), Akihiro Yamamura (Akita University)
منابع مشابه
NOVEL QUBIT QUANTUM CRYPTOGRAPHY PROTOCOLS Quantum Secret Sharing
This report summarises the ongoing work in QuComm on the demonstration of novel quantum communication protocols, in particular multi-party protocols or protocols which use more than 2-states (or more than one qubit). Such new protocols will extend the capabilities of quantum communication by increasing the channel capacity, by making the systems less sensitive to channel noise. Examples of such...
متن کاملEntanglement enhanced quantum cryptography fiber systems
This report summarises the ongoing work in QuComm on fiber based entanglement quantum cryptography.
متن کاملua nt - p h / 03 10 15 6 v 1 2 6 O ct 2 00 3 Quantum and classical advantage distillation are not equivalent
We report that, for the generation of a secure cryptographic key from correlations established through a noisy quantum channel, the quantum and classical advantage distillation procedures are not equivalent, when coherent eavesdropping attacks are duly taken into account. The quantum procedure can tolerate markedly more noise in the channel than the classical procedure. One of the important pro...
متن کاملTwo-way Protocol for Quantum Cryptography with Imperfect Devices
The security of a deterministic quantum scheme for communication, namely the LM05 [1], is studied in presence of a lossy channel under the assumption of imperfect generation and detection of single photons. It is shown that the scheme allows for a rate of distillable secure bits higher than that pertaining to BB84 [2]. We report on a first implementation of LM05 with weak pulses.
متن کاملDesign of low power random number generators for quantum-dot cellular automata
Quantum-dot cellular automata (QCA) are a promising nanotechnology to implement digital circuits at the nanoscale. Devices based on QCA have the advantages of faster speed, lower power consumption, and greatly reduced sizes. In this paper, we are presented the circuits, which generate random numbers in QCA. Random numbers have many uses in science, art, statistics, cryptography, gaming, gambli...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/0905.4325 شماره
صفحات -
تاریخ انتشار 2009