Quantum dense key distribution
نویسندگان
چکیده
منابع مشابه
dense key distribution ”
In his Comment [1], Wójcik proposes two simple schemes for performing eavesdropping attacks to the Quantum Dense Key Distribution protocol (QDKD) in Ref. [2]. These schemes enable Eve to achieve a larger mutual information than Alice’s and Bob’s one, but maintaining inviolated the security condition (Eq. (6) in Ref. [2]). Eve’s attack in Wójcik’s schemes relies on the possibility of subtraction...
متن کاملdense key distribution ”
In this Comment we question the security of recently proposed by Degiovanni et al. [Phys. Rev. A 69 (2004) 032310] scheme of quantum dense key distribution. PACS number(s): 03.67.Hk, 03.65.Ud
متن کاملQuantum Authenticated Key Distribution
Quantum key distribution algorithms use a quantum communication channel with quantum information and a classical communication channel for binary information. The classical channel, in all algorithms to date, was required to be authenticated. Moreover, Lomonaco [8] claimed that authentication is not possible using only quantum means. This paper reverses this claim. We design an algorithm for qu...
متن کاملQuantum Key Distribution - QKD
This paper provides an overview of quantum key distribution targeted towards the computer science community. A brief description of the relevant principles from quantum mechanics is provided before surveying the most prominent quantum key distribution protocols present in the literature. In particular this paper describes the BB84 protocol and its many variants as well as Eckert's approach thro...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Physical Review A
سال: 2004
ISSN: 1050-2947,1094-1622
DOI: 10.1103/physreva.69.032310