Discrete rotational symmetry and quantum-key-distribution protocols

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Quantum Cryptographic Key Distribution Protocols

The application of the principles of quantum mechanics to cryptography has led to a respectable new dimension in confidential communication. As a result of these developments, it is now possible to construct cryptographic communication systems which detect unauthorized eavesdropping should it occur, and which give a incontestable guarantee of no eavesdropping should it not occur. Here several p...

متن کامل

Optimization of Quantum Key Distribution Protocols

November 23, 2017 Quantum Key Distribution is a practically implementable information-theoretic secure method for transmitting keys to remote partners performing quantum communication. After examining various protocols from the simplest such as QC and BB84 we move on to describe BBM92, DPSK, SARG04 and finally MDI from the largest possible communication distance and highest secret key bitrate. ...

متن کامل

SECURITY USING QUANTUM KEY DISTRIBUTION PROTOCOLS (QKDPs)

Most cryptographic mechanisms such as symmetric and asymmetric cryptography, often involve the use of cryptographic keys. However, all cryptographic techniques will be ineffective if the key distribution mechanism is weak. Quantum Key Distribution or Quantum Cryptography is attracting much attention as a solution of the problem of Key Distribution; QKD offers unconditionally secure communicatio...

متن کامل

Vulnerabilities in Quantum Key Distribution Protocols

Recently proposed quantum key distribution protocols are shown to be vulnerable to a classic manin-the-middle attack using entangled pairs created by Eve. It appears that the attack could be applied to any protocol that relies on manipulation and return of entangled qubits to create a shared key. The protocols that are cryptana lyzed in this paper were proven secure with respect to some eavesdr...

متن کامل

Quantum Key Distribution Protocols: A Survey

Most cryptographic mechanisms, such as symmetric and asymmetric cryptography, often involve the use of cryptographic keys. However, all cryptographic techniques will be ineffective if the key distribution mechanism is weak. The security of most modern cryptographic systems of key distribution mechanism is based on computational complexity and the extraordinary time needed to break the code. Qua...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Physical Review A

سال: 2007

ISSN: 1050-2947,1094-1622

DOI: 10.1103/physreva.75.032341