Reply to Comment: Quantum Cryptography Based on Orthogonal States?
نویسندگان
چکیده
Peres [1] claims that our protocol [2] does not present any novel feature, and it is very similar to the oldest protocol of Bennett and Brassard [3] (BB84). We completely disagree with this claim and with other points raised in the Comment. The essential novelty of our protocol is that the carrier of information is in a quantum state belonging to a definite set of orthonormal states. Any other protocol, as well as the BB84 scheme, does not have this feature, and in fact their security is based on that. Let us quote a recent paper [4] stating that: " ... cloning can give a faithful replica, while leaving the state of the original intact, only if it is known in advance that the carrier of information is in a quantum state belonging to a definite set of orthonormal states. If this is not the case, the eavesdropper will not be able to construct even an imperfect cloning device, which would give some information on the carrier without modifying it: a device of this sort would violate unitarity. Therefore coding based on nonorthogonal quantum states (which cannot be cloned) gives the possibility to detect any eavesdropping attempt ". Thus, the security of BB84 (which uses 4 states, not all orthogonal) is assured by the 'no-cloning' theorem, which is not applicable to our case. Peres claims that in our method Eve has access only to nonorthogonal states: " The ρ ± states, as seen by Eve, are not orthogonal. Their are identical ". However, the nonorthogonality (as seen by Eve) in our scheme is not " just as in the BB84 protocol ". As Peres admits, in the case of known sending times our protocol is not secure, yet his nonorthogonality argument remains the same. The security of our protocol is not based on nonorthogonality, but on causality. As we have proved in the Letter [2], a successful eavesdropping is possible only if some information can reach Bob before it leaves Alice's site-therefore, the protocol is secure. This is also the feature of the protocol proposed at the end of the Comment, in which a particle is sent at a known time in one out of two GV interferometers (GV2). A successful eavesdropping is impossible in this case too, otherwise the wavepacket delayed at Alice's location has to reach Bob's site before 1
منابع مشابه
Quantum cryptography based on orthogonal states.
All existing quantum cryptosystems use non-orthogonal states as the carriers of information. Non-orthogonal states cannot be cloned (duplicated) by an eavesdropper. In result, any eavesdropping attempt must introduce errors in the transmission, and therefore, can be detected by the legal users of the communication channel. Orthogonal states are not used in quantum cryptography, since they can b...
متن کامل0 A Simple Proof of the Unconditional Security of Relativistic Quantum Cryptography
A simple proof of the unconditional security of a relativistic quantum cryptosystem based on orthogonal states is proposed. Restrictions imposed by special relativity allow to substantially simplify the proof compared with the non-relativistic cryptosystems involving non-orthogonal states. Important for the proposed protocol is the spatio-temporal structure of the quantum states which is actual...
متن کاملReply to “ Comment on ‘ Mutually unbiased bases , orthogonal Latin squares , and hidden - variable models ’ ”
Tomasz Paterek,1 Borivoje Dakić,2,3 and Časlav Brukner2,3 1Centre for Quantum Technologies, National University of Singapore, 3 Science Drive 2, 117543 Singapore, Singapore 2Institute for Quantum Optics and Quantum Information, Austrian Academy of Sciences, Boltzmanngasse 3, A-1090 Wien, Austria 3Faculty of Physics, University of Vienna, Boltzmanngasse 5, A-1090 Wien, Austria (Received 28 Febru...
متن کاملLong Distance Quantum Key Distribution without Quantum Memory
A quantum cryptography scheme for lossy channel is proposed which does not employ quantum memory. The scheme also does not use quantum codes and is rather simple for practical implementation. The goal of quantum cryptography is to secretly distribute the key (a string of bits) between the two spatially separated legitimate users. The existing quantum cryptography schemes can be classified into ...
متن کاملNo Cloning of Orthogonal States in Composite Systems
The no-cloning principle tells us that nonorthogonal quantum states cannot be cloned, but it does not tell us that orthogonal states can always be cloned. We suggest a situation where the cloning transformations are restricted, leading to a novel type of no-cloning principle. In the case of a composite system made of two subsystems: if the subsystems are only available one after the other then ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1996