Eavesdropping on practical quantum cryptography
نویسندگان
چکیده
منابع مشابه
Limitations on practical quantum cryptography
We provide limits to practical quantum key distribution, taking into account channel losses, a realistic detection process, and imperfections in the "qubits" sent from the sender to the receiver. As we show, even quantum key distribution with perfect qubits might not be achievable over long distances when the other imperfections are taken into account. Furthermore, existing experimental schemes...
متن کاملEntangled state quantum cryptography: eavesdropping on the ekert protocol
Using polarization-entangled photons from spontaneous parametric down-conversion, we have implemented Ekert's quantum cryptography protocol. The near-perfect correlations of the photons allow the sharing of a secret key between two parties. The presence of an eavesdropper is continually checked by measuring Bell's inequalities. We investigated several possible eavesdropper strategies, including...
متن کاملTowards practical quantum cryptography
Quantum cryptography bases the security of quantum key exchange on the laws of quantum physics and is likely to become the first application employing quantum effects for communication. Here we present performance tests of a new design based on polarization encoding of attenuated, coherent light pulses. Our measurements show that this compact setup can achieve an effective key-bit rate in the k...
متن کاملPractical Quantum Cryptography
We report our recent results in development of the secure fiber-optics communication system based upon quantum key distribution. Emphasize is made on the limitation imposed by the state-of-the-art components crucial for the system performance. We discuss the problem of the interferometer design and highlight the possible security loopholes known. Together with single photon counting performance...
متن کاملAspects of entangled translucent eavesdropping in quantum cryptography
We present a mathematical physics analysis of entangled translucent eavesdropping in quantum cryptography, based on the recent work of Ekert, Huttner, Palma, and Peres @Phys. Rev. A 50, 1047 ~1994!#. The key generation procedure involves the transmission, interception, and reception of two nonorthogonal photon polarization states. At the receiving end, a positive operator valued measure ~POVM! ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Modern Optics
سال: 2003
ISSN: 0950-0340,1362-3044
DOI: 10.1080/0950034031000077542