Authenticated semi-quantum key distribution without entanglement
نویسندگان
چکیده
منابع مشابه
Quantum Authenticated Key Distribution
Quantum key distribution algorithms use a quantum communication channel with quantum information and a classical communication channel for binary information. The classical channel, in all algorithms to date, was required to be authenticated. Moreover, Lomonaco [8] claimed that authentication is not possible using only quantum means. This paper reverses this claim. We design an algorithm for qu...
متن کاملQuantum multiparty key distribution protocol without use of entanglement
We propose a quantum key distribution (QKD) protocol that enables three parties agree at once on a shared common random bit string in presence of an eavesdropper without use of entanglement. We prove its unconditional security and analyze the key rate.
متن کاملEntanglement-based quantum key distribution without an entangled-photon source
Quantum key distribution ~QKD! has been studied extensively as a means to realize unconditionally secure communication systems. Two legal parties ~Alice and Bob! create a secret key, security of which against eavesdropping is guaranteed by the law of quantum mechanics, and use it as a one-time pad for encrypting messages. Following the first proposal that used four nonorthogonal states @Benneet...
متن کاملEntanglement and Quantum Key Distribution
Entanglement in quantum mechanics refers to particles whose individual states cannot be written without reference to the state of other particles. Such states are said to be non-separable, and measurements of the state of one entangled particle alter the state of all entangled particles. This unusual phenomena has applications in quantum teleportation, superdense coding, and various other appli...
متن کاملSemi-Quantum Key Distribution
Secure key distribution among two remote parties is impossible when both are classical, unless some unproven (and arguably unrealistic) computation-complexity assumptions are made, such as the difficulty of factorizing large numbers. On the other hand, a secure key distribution is possible when both parties are quantum. What is possible when only one party (Alice) is quantum, yet the other (Bob...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Quantum Information Processing
سال: 2020
ISSN: 1570-0755,1573-1332
DOI: 10.1007/s11128-019-2573-2