Goldenberg and Vaidman Reply.
نویسندگان
چکیده
Goldenberg and Vaidman Reply: Peres [1] claims that our protocol (GV) [2] does not present any novel feature, and it is very similar to the oldest protocol of Bennett and Brassard (BB84) [3]. We completely disagree with this claim and with other points raised in the Comment. The essential novelty of our protocol is that the carrier of information is in a quantum state belonging to a definite set of orthonormal states. Any other protocol, as well as the BB84 scheme, does not have this feature, and, in fact, their security is based on that. Let us quote a recent paper [4], coauthored by Peres, stating that “... cloning can give a faithful replica, while leaving the state of the original intact, only if it is known in advance that the carrier of information is in a quantum state belonging to a definite set of orthonormal states. If this is not the case, the eavesdropper will not be able to construct even an imperfect cloning device, which would give some information on the carrier without modifying it: a device of this sort would violate unitarity. Therefore coding based on nonorthogonal quantum states (which cannot be cloned) gives the possibility to detect any eavesdropping attempt.” Thus, the security of BB84 (which uses four states, not all orthogonal) is assured by the “no-cloning” theorem, which is not applicable to our case. Peres claims that in our method Eve has access only to nonorthogonal states: “The r0 6 states, as seen by Eve, are not orthogonal. They are identical.” However, the nonorthogonality (as seen by Eve) in our scheme is not “just as in the BB84 protocol.” As Peres admits, in the case of known sending times our protocol is not secure, yet his nonorthogonality argument remains the same. The security of our protocol is not based on nonorthogonality, but on causality. As we have proved in our Letter [3], a successful eavesdropping is possible only if some information can reach Bob before it leaves Alice’s site— therefore, the protocol is secure. According to Peres, an important common feature of GV and BB84 is that the information is sent in two consecutive steps: the first step is sending the particle, and the second step is sending the necessary classical information, namely the chosen basis (BB84), or the transmission time (GV). The first conceptual difference between the protocols is that in BB84 the two steps are necessary for sending the information, while in GV the first step is enough. The only purpose of the second step is to assure security against eavesdropping. The second difference is that the first step of our protocol also consists of two stages: sending the first wave packet and sending the second wave packet (the delayed one). Alice does not have to wait until the end of the first step for announcing the sending time. She can do that after the first stage of the first step (i.e., after the first wave packet reaches Bob), thus, “the second step” might end before “the first step.” These two stages of the first step, i.e., the fact that the quantum signal consists of two separated parts, is the core
منابع مشابه
Reply to “The three-box paradox revisited” by Ravon and Vaidman
The Three-Box “paradox” was introduced by Aharonov and Vaidman (1991) (henceforth “AV”); it has been engaged in controversy regarding its significance and meaning ever since. Vaidman (e.g., (1999a), (1999b)) has presented it as strange even within the ordinary strangeness of quantum mechanics. I have argued (Kirkpatrick, 2003a) for what I see as the quite ordinary, non-paradoxical nature of the...
متن کاملApplications of a Simple Formula
New applications of the formula A|ψ〉 = 〈A〉|ψ〉 +∆A|ψ⊥〉 are discussed. Simple derivations of the Heisenberg uncertainty principle and of related inequalities are presented. In addition, the formula is used in an instructive paradox which clarifies a fundamental notion in quantum mechanics.
متن کاملQuantum cryptography based on orthogonal states.
All existing quantum cryptosystems use non-orthogonal states as the carriers of information. Non-orthogonal states cannot be cloned (duplicated) by an eavesdropper. In result, any eavesdropping attempt must introduce errors in the transmission, and therefore, can be detected by the legal users of the communication channel. Orthogonal states are not used in quantum cryptography, since they can b...
متن کاملDefending Time-Symmetrised Quantum Counterfactuals
Recently, several authors have criticised the time-symmetrised quantum theory originated by the work of Aharonov, Bergmann and Lebowitz (1964). The core of this criticism was a proof, appearing in various forms, which showed that the counterfactual interpretation of time-symmetrised quantum theory cannot be reconciled with standard quantum theory. I (Vaidman, 1996a, 1997) have argued that the a...
متن کاملQuantum key distribution in the Holevo limit.
A theorem by Shannon and the Holevo theorem impose that the efficiency of any protocol for quantum key distribution, E, defined as the number of secret (i.e., allowing eavesdropping detection) bits per transmitted bit plus qubit, is E < or = 1. The problem addressed here is whether the limit E = 1 can be achieved. It is showed that it can be done by splitting the secret bits between several qub...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Physical review letters
دوره 77 15 شماره
صفحات -
تاریخ انتشار 1996