qu an t - ph / 9 71 10 33 18 N ov 1 99 7 Security against eavesdropping in quantum cryptography

نویسنده

  • Stephen M. Barnett
چکیده

Quantum cryptography is a method for providing two parties who want to communicate securely with a secret key to be used in established protocols of classical cryptography. For more reviews of this topic see [1, 2, 3]. Bennett and Brassard showed that it is possible, at least ideally, to create a secret key, shared by sender and receiver, without both parties sharing any secret beforehand. We refer to this protocol as the BB84 protocol. [4] To achieve this goal, sender and receiver are linked by two channels. The first channel is a public channel. The information distributed on it is available to both parties and to a potential eavesdropper. To demonstrate the principle of quantum cryptography we assume that the signals on this channel can not be changed by third parties. The second channel is a channel with strong quantum features. An eavesdropper can interact with the signal in an effort to extract information about the signals. The signal states are chosen in such a way that there is always, on average, a back reaction onto the signal states. We assume the quantum channel to be noiseless and perfect so that the back reaction of the eavesdropper’s activity manifests itself as an induced error rate in the signal transmission. The BB84 protocol uses the polarisation states of single photons as signal states. The signal states are, for example, linear vertical or horizontal polarised photons or right or left circular polarised photons. The sender sends a sequence of single photons with a polarisation chosen randomly from the four given ones. The receiver uses randomly one out of two given polarisation analysers for each signal photon. One of the analysers distinguishes between the two linear polarisations, the other between the circular polarisations. Therefore the sequence of signals contains two types of transmissions. In the first type the photon is prepared in a polarisation state which the polarisation analyser, chosen by the receiver, is able to distinguish unambiguously. An example is that a horizontal polarised photon is sent and the receiver chooses to use the linear polarisation analyser. Signals

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

qu an t - ph / 9 60 50 10 v 2 8 J an 1 99 7 Bounds on Information and the Security of Quantum Cryptography

Strong attacks against quantum key distribution use quantum memories and quantum gates to attack directly the final key. In this paper we extend a novel security result recently obtained, to demonstrate proofs of security against a wide class of such attacks. To reach this goal we calculate information-dependent reduced density matrices, we study the geometry of quantum mixed state, and we find...

متن کامل

ar X iv : 0 71 0 . 34 25 v 2 [ qu an t - ph ] 1 4 N ov 2 00 7 Properties of the residual entanglement for n - qubits 1

X iv :0 71 0. 34 25 v2 [ qu an tph ] 1 4 N ov 2 00 7 Properties of the residual entanglement for n-qubits Dafa Li, Xiangrong Li, Hongtao Huang, Xinxin Li a Dept of mathematical sciences, Tsinghua University, Beijing 100084 CHINA b Department of Mathematics, University of California, Irvine, CA 92697-3875, USA c Electrical Engineering and Computer Science Department University of Michigan, Ann A...

متن کامل

ar X iv : 0 71 1 . 35 78 v 1 [ qu an t - ph ] 2 2 N ov 2 00 7 A formula for the spectral projection of the time operator

In this paper, we study the one-level Friedrichs model with using the quantum time super-operator that predicts the excited state decay inside the continuum. Its survival probability in long time limit is an algebraically decreasing function and an exponentially decreasing multiplied by the oscillating functions.

متن کامل

ar X iv : 0 90 3 . 31 18 v 1 [ qu an t - ph ] 1 8 M ar 2 00 9 Generation of a Common Reference String , secure against Quantum Adversaries , and Applications

In this paper, we present the generation of a common reference string “from scratch” via coin-flipping in the presence of a quantum adversary. First, we present how we achieve quantumsecure coin-flipping using Watrous’ quantum rewinding technique [Wat06]. Then, by combining this coin-flipping with any non-interactive zero-knowledge protocol we get an easy transformation from non-interactive zer...

متن کامل

ar X iv : 0 71 2 . 14 94 v 1 [ qu an t - ph ] 1 0 D ec 2 00 7 Improved one - way rates for BB 84 and 6 - state protocols

We study the advantages to be gained in quantum key distribution (QKD) protocols by combining the techniques of local randomization, or noisy preprocessing, and structured (nonrandom) block codes. Extending the results of [Smith, Renes, and Smolin, quant-ph/0607018] pertaining to BB84, we improve the best-known lower bound on the error rate for the 6-state protocol from 14.11% for local randomi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1996