Shor-Preskill-type security proof for concatenated Bennett-Brassard 1984 quantum-key-distribution protocol

نویسندگان

  • Won-Young Hwang
  • Keiji Matsumoto
  • Hiroshi Imai
  • Jaewan Kim
  • Hai-Woong Lee
چکیده

Won-Young Hwang,* Keiji Matsumoto, Hiroshi Imai, Jaewan Kim, and Hai-Woong Lee IMAI Quantum Computation and Information Project, ERATO, Japan Science and Technology Corporation, Daini Hongo White Building 201, 5-28-3, Hongo, Bunkyo, Tokyo 133-0033, Japan School of Computational Sciences, Korea Institute for Advanced Study, Seoul 130-012, Korea Department of Physics, Korea Advanced Institute of Science and Technology, Daejeon 305-701, Korea ~Received 10 June 2001; revised manuscript received 31 October 2002; published 10 February 2003!

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Simple proof of security of the BB84 quantum key distribution protocol

We prove that the 1984 protocol of Bennett and Brassard (BB84) for quantum key distribution is secure. We first give a key distribution protocol based on entanglement purification, which can be proven secure using methods from Lo and Chau's proof of security for a similar protocol. We then show that the security of this protocol implies the security of BB84. The entanglement purification based ...

متن کامل

Simple security proof of quantum key distribution based on complementarity

We present an approach to the unconditional security of quantum key distribution protocols based on a complementarity argument. The approach is applicable to, but not limited to, every case that has been treated via the argument by Shor and Preskill based on entanglement distillation, with a benefit of decoupling of the error correction from the privacy amplification. It can also treat cases wi...

متن کامل

Secure quantum key distribution with an uncharacterized source.

We prove the security of the Bennett-Brassard (BB84) quantum key distribution protocol for an arbitrary source whose averaged states are basis independent, a condition that is automatically satisfied if the source is suitably designed. The proof is based on the observation that, to an adversary, the key extraction process is equivalent to a measurement in the sigma(x) basis performed on a pure ...

متن کامل

Proof of security of quantum key distribution with two-way classical communications

Shor and Preskill have provided a simple proof of security of the standard quantum key distribution scheme by Bennett and Brassard (BB84) by demonstrating a connection between key distribution and entanglement purification protocols with one-way communications. Here we provide proofs of security of standard quantum key distribution schemes, BB84 and the six-state scheme, against the most genera...

متن کامل

Quantum Error-correction Codes on Abelian Groups

In classical public key cryptography the security of the cryptosystems are based on the difficulty of calculating certain functions. A famous example is the ASP cryptosystem which was based on the assumption that factoring large integers could not be done in polynomial time (on classical computers). The typical situation in these systems is that two parties (Bob and Alice) whish to communicate ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003