Attacks exploiting deviation of mean photon number in quantum key distribution and coin tossing
نویسندگان
چکیده
منابع مشابه
Attacks exploiting deviation of mean photon number in quantum key distribution and coin-tossing
Shihan Sajeed,1,2,* Igor Radchenko,3 Sarah Kaiser,1,4 Jean-Philippe Bourgoin,1,4 Anna Pappa,5 Laurent Monat,6 Matthieu Legré,6 and Vadim Makarov1,4,2 1Institute for Quantum Computing, University of Waterloo, Waterloo, ON, N2L 3G1 Canada 2Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, ON, N2L 3G1 Canada 3General Physics Institute, Russian Academy of Sciences...
متن کاملExperimental quantum coin tossing.
In this Letter we present the first implementation of a quantum coin-tossing protocol. This protocol belongs to a class of "two-party" cryptographic problems, where the communication partners distrust each other. As with a number of such two-party protocols, the best implementation of the quantum coin tossing requires qutrits, resulting in a higher security than using qubits. In this way, we ha...
متن کاملRelativistic quantum coin tossing
A relativistic quantum information exchange protocol is proposed allowing two distant users to realize “coin tossing” procedure. The protocol is based on the point that in relativistic quantum theory reliable distinguishing between the two orthogonal states generally requires a finite time depending on the structure of these states. PACS numbers: 03.67.-a, 03.65.Bz, 42.50Dv The coin tossing pro...
متن کاملThe Effect of Mean Photon Number to the Output Key Rate in Quantum Key Distribution
Quantum Cryptography guarantees absolute confidentiality for secret key exchanged via an optical fiber. The ability lies in the possibility of distributing the secret key securely in the form of photon. We show that there are different values of optimal mean photon number (^) based on which assumption is considered for Eve's technology. For lower optimal fi such as p=0. / and ^=0.4, the system ...
متن کاملExperimental quantum tossing of a single coin
The cryptographic protocol of coin tossing consists of two parties, Alice and Bob, that do not trust each other, but want to generate a random bit. If the parties use a classical communication channel and have unlimited computational resources, one of them can always cheat perfectly. Here we analyze in detail how the performance of a quantum coin tossing experiment should be compared to classic...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Physical Review A
سال: 2015
ISSN: 1050-2947,1094-1622
DOI: 10.1103/physreva.91.032326