Security in quantum cryptography
نویسندگان
چکیده
Secure communications is a vital need of the world, and basic features quantum mechanics seemingly offer fundamental new tools for achieving this security. But do these really work? This review gives due attention to real-world problems with experimental cryptography, but heart an in-depth survey analyses developed prove security techniques introduced by Wiesner, Ekert, Bennett, Brassard. A broader set cryptographic tasks have aspects which are also discussed here.
منابع مشابه
Entropy Security in Quantum Cryptography
Quantum mechanics is the basic principle which is applied in the cryptographic scenario of quantum cryptography. Present paper provides a conceptual framework on the high level security protocol in Quantum cryptography. This is used as a base for data security through quantum computing in modern cryptosystem. In this paper first of all a detailed description of BB84 protocol with noise and with...
متن کاملEntropic security in quantum cryptography
We present two new definitions of security for quantum ciphers which are inspired by the definition of entropic security and entropic indistinguishability defined by Dodis and Smith. We prove the equivalence of these two new definitions. We also propose a generalization of a cipher described by Dodis and Smith and show that it can actually encrypt n qubits using less than n bits of key under re...
متن کاملNetwork Security Using Quantum Cryptography
Network security and cryptography is a subject about how to protect information in digital form and to provide security services. The purpose of a digital signature is to provide a means for an entity to bind its identity to a piece of information. The common attacks on digital signature were reviewed. The first method was the RSA signature scheme, which remains today one of the most practical ...
متن کاملComposable security in relativistic quantum cryptography
Relativistic protocols have been proposed to overcome some impossibility results in classical and quantum cryptography. In such a setting, one takes the location of honest players into account, and uses the fact that information cannot travel faster than the speed of light to limit the abilities of dishonest agents. For example, various relativistic bit commitment protocols have been proposed [...
متن کاملSecurity of Quantum Cryptography against Collective Attacks
We present strong attacks against quantum key distribution schemes which use quantum memories and quantum gates to attack directly the final key. We analyze a specific attack of this type, for which we find the density matrices available to the eavesdropper and the optimal information which can be extracted from them. We prove security against this attack and discuss security against any attack...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Reviews of Modern Physics
سال: 2022
ISSN: ['0034-6861', '1539-0756', '1538-4527']
DOI: https://doi.org/10.1103/revmodphys.94.025008