qu an t - ph / 9 71 10 33 18 N ov 1 99 7 Security against eavesdropping in quantum cryptography
نویسنده
چکیده
Quantum cryptography is a method for providing two parties who want to communicate securely with a secret key to be used in established protocols of classical cryptography. For more reviews of this topic see [1, 2, 3]. Bennett and Brassard showed that it is possible, at least ideally, to create a secret key, shared by sender and receiver, without both parties sharing any secret beforehand. We refer to this protocol as the BB84 protocol. [4] To achieve this goal, sender and receiver are linked by two channels. The first channel is a public channel. The information distributed on it is available to both parties and to a potential eavesdropper. To demonstrate the principle of quantum cryptography we assume that the signals on this channel can not be changed by third parties. The second channel is a channel with strong quantum features. An eavesdropper can interact with the signal in an effort to extract information about the signals. The signal states are chosen in such a way that there is always, on average, a back reaction onto the signal states. We assume the quantum channel to be noiseless and perfect so that the back reaction of the eavesdropper’s activity manifests itself as an induced error rate in the signal transmission. The BB84 protocol uses the polarisation states of single photons as signal states. The signal states are, for example, linear vertical or horizontal polarised photons or right or left circular polarised photons. The sender sends a sequence of single photons with a polarisation chosen randomly from the four given ones. The receiver uses randomly one out of two given polarisation analysers for each signal photon. One of the analysers distinguishes between the two linear polarisations, the other between the circular polarisations. Therefore the sequence of signals contains two types of transmissions. In the first type the photon is prepared in a polarisation state which the polarisation analyser, chosen by the receiver, is able to distinguish unambiguously. An example is that a horizontal polarised photon is sent and the receiver chooses to use the linear polarisation analyser. Signals
منابع مشابه
qu an t - ph / 9 60 50 10 v 2 8 J an 1 99 7 Bounds on Information and the Security of Quantum Cryptography
Strong attacks against quantum key distribution use quantum memories and quantum gates to attack directly the final key. In this paper we extend a novel security result recently obtained, to demonstrate proofs of security against a wide class of such attacks. To reach this goal we calculate information-dependent reduced density matrices, we study the geometry of quantum mixed state, and we find...
متن کاملar X iv : 0 71 0 . 34 25 v 2 [ qu an t - ph ] 1 4 N ov 2 00 7 Properties of the residual entanglement for n - qubits 1
X iv :0 71 0. 34 25 v2 [ qu an tph ] 1 4 N ov 2 00 7 Properties of the residual entanglement for n-qubits Dafa Li, Xiangrong Li, Hongtao Huang, Xinxin Li a Dept of mathematical sciences, Tsinghua University, Beijing 100084 CHINA b Department of Mathematics, University of California, Irvine, CA 92697-3875, USA c Electrical Engineering and Computer Science Department University of Michigan, Ann A...
متن کاملar X iv : 0 71 1 . 35 78 v 1 [ qu an t - ph ] 2 2 N ov 2 00 7 A formula for the spectral projection of the time operator
In this paper, we study the one-level Friedrichs model with using the quantum time super-operator that predicts the excited state decay inside the continuum. Its survival probability in long time limit is an algebraically decreasing function and an exponentially decreasing multiplied by the oscillating functions.
متن کاملar X iv : 0 90 3 . 31 18 v 1 [ qu an t - ph ] 1 8 M ar 2 00 9 Generation of a Common Reference String , secure against Quantum Adversaries , and Applications
In this paper, we present the generation of a common reference string “from scratch” via coin-flipping in the presence of a quantum adversary. First, we present how we achieve quantumsecure coin-flipping using Watrous’ quantum rewinding technique [Wat06]. Then, by combining this coin-flipping with any non-interactive zero-knowledge protocol we get an easy transformation from non-interactive zer...
متن کاملar X iv : 0 71 2 . 14 94 v 1 [ qu an t - ph ] 1 0 D ec 2 00 7 Improved one - way rates for BB 84 and 6 - state protocols
We study the advantages to be gained in quantum key distribution (QKD) protocols by combining the techniques of local randomization, or noisy preprocessing, and structured (nonrandom) block codes. Extending the results of [Smith, Renes, and Smolin, quant-ph/0607018] pertaining to BB84, we improve the best-known lower bound on the error rate for the 6-state protocol from 14.11% for local randomi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1996