Quantum Cryptography with Orthogonal States?

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Quantum cryptography based on orthogonal states.

All existing quantum cryptosystems use non-orthogonal states as the carriers of information. Non-orthogonal states cannot be cloned (duplicated) by an eavesdropper. In result, any eavesdropping attempt must introduce errors in the transmission, and therefore, can be detected by the legal users of the communication channel. Orthogonal states are not used in quantum cryptography, since they can b...

متن کامل

Reply to Comment: Quantum Cryptography Based on Orthogonal States?

Peres [1] claims that our protocol [2] does not present any novel feature, and it is very similar to the oldest protocol of Bennett and Brassard [3] (BB84). We completely disagree with this claim and with other points raised in the Comment. The essential novelty of our protocol is that the carrier of information is in a quantum state belonging to a definite set of orthonormal states. Any other ...

متن کامل

Quantum Cryptography with Squeezed States

A quantum key distribution scheme based on the use of squeezed states is presented. The states are squeezed in one of two field quadrature components, and the value of the squeezed component is used to encode a character from an alphabet. The uncertainty relation between quadrature components prevents an eavesdropper from determining both with enough precision to determine the character being s...

متن کامل

Mixed States in Quantum Cryptography

Mixed states are important in quantum computation and quantum information theories. Each quantum mixed state can be described by its density matrix. We discuss how properties of mixed states and their density matrices can be used to explain fundamentals of most popular quantum computing protocols. By using density matrices we show that some of quantum protocols are safe, but some of them allow ...

متن کامل

Faked states attack and quantum cryptography protocols

Leveraging quantum mechanics, cryptographers have devised provably secure key sharing protocols[4], [3], [6], [17]. Despite proving the security in theory, real-world application falls short of the ideal. Last year, cryptanalysts completed an experiment demonstrating a successful eavesdropping attack on commercial quantum key distribution (QKD) systems[12]. This attack exploits a weakness in th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Physical Review Letters

سال: 1996

ISSN: 0031-9007,1079-7114

DOI: 10.1103/physrevlett.77.3264