Attacks exploiting deviation of mean photon number in quantum key distribution and coin tossing

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Attacks exploiting deviation of mean photon number in quantum key distribution and coin-tossing

Shihan Sajeed,1,2,* Igor Radchenko,3 Sarah Kaiser,1,4 Jean-Philippe Bourgoin,1,4 Anna Pappa,5 Laurent Monat,6 Matthieu Legré,6 and Vadim Makarov1,4,2 1Institute for Quantum Computing, University of Waterloo, Waterloo, ON, N2L 3G1 Canada 2Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, ON, N2L 3G1 Canada 3General Physics Institute, Russian Academy of Sciences...

متن کامل

Experimental quantum coin tossing.

In this Letter we present the first implementation of a quantum coin-tossing protocol. This protocol belongs to a class of "two-party" cryptographic problems, where the communication partners distrust each other. As with a number of such two-party protocols, the best implementation of the quantum coin tossing requires qutrits, resulting in a higher security than using qubits. In this way, we ha...

متن کامل

Relativistic quantum coin tossing

A relativistic quantum information exchange protocol is proposed allowing two distant users to realize “coin tossing” procedure. The protocol is based on the point that in relativistic quantum theory reliable distinguishing between the two orthogonal states generally requires a finite time depending on the structure of these states. PACS numbers: 03.67.-a, 03.65.Bz, 42.50Dv The coin tossing pro...

متن کامل

The Effect of Mean Photon Number to the Output Key Rate in Quantum Key Distribution

Quantum Cryptography guarantees absolute confidentiality for secret key exchanged via an optical fiber. The ability lies in the possibility of distributing the secret key securely in the form of photon. We show that there are different values of optimal mean photon number (^) based on which assumption is considered for Eve's technology. For lower optimal fi such as p=0. / and ^=0.4, the system ...

متن کامل

Experimental quantum tossing of a single coin

The cryptographic protocol of coin tossing consists of two parties, Alice and Bob, that do not trust each other, but want to generate a random bit. If the parties use a classical communication channel and have unlimited computational resources, one of them can always cheat perfectly. Here we analyze in detail how the performance of a quantum coin tossing experiment should be compared to classic...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Physical Review A

سال: 2015

ISSN: 1050-2947,1094-1622

DOI: 10.1103/physreva.91.032326