Practical Stabilization of Counterfactual Quantum Cryptography
نویسندگان
چکیده
منابع مشابه
Counterfactual quantum cryptography.
Quantum cryptography allows one to distribute a secret key between two remote parties using the fundamental principles of quantum mechanics. The well-known established paradigm for the quantum key distribution relies on the actual transmission of signal particle through a quantum channel. In this Letter, we show that the task of a secret key distribution can be accomplished even though a partic...
متن کاملTowards practical quantum cryptography
Quantum cryptography bases the security of quantum key exchange on the laws of quantum physics and is likely to become the first application employing quantum effects for communication. Here we present performance tests of a new design based on polarization encoding of attenuated, coherent light pulses. Our measurements show that this compact setup can achieve an effective key-bit rate in the k...
متن کاملPractical Quantum Cryptography
We report our recent results in development of the secure fiber-optics communication system based upon quantum key distribution. Emphasize is made on the limitation imposed by the state-of-the-art components crucial for the system performance. We discuss the problem of the interferometer design and highlight the possible security loopholes known. Together with single photon counting performance...
متن کاملLimitations of Practical Quantum Cryptography
As we all know that the quantum cryptography is having lots of consideration in present time for security but it’s important to note that implementation of algorithms using QC is not viable if one wants to have the security intact. It can only be used to share keys using Quantum Key Distribution (QKD). Distribution of keys is just a part of securing information. Proper encryption and decryption...
متن کاملQuantum Bit Commitment Protocol Based on Counterfactual Quantum Cryptography
We present a new quantum bit commitment (QBC) protocol based on counterfactual quantum cryptography. We analyze the security of this protocol, find that it can resist the attack presented by QBC’s no-go theorem. Our protocol is simple, and probably gives a new way of constructing QBC protocol.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Quantum Information Science
سال: 2011
ISSN: 2162-5751,2162-576X
DOI: 10.4236/jqis.2011.13016