Security of counterfactual quantum cryptography
نویسندگان
چکیده
منابع مشابه
Counterfactual quantum cryptography.
Quantum cryptography allows one to distribute a secret key between two remote parties using the fundamental principles of quantum mechanics. The well-known established paradigm for the quantum key distribution relies on the actual transmission of signal particle through a quantum channel. In this Letter, we show that the task of a secret key distribution can be accomplished even though a partic...
متن کاملQuantum Bit Commitment Protocol Based on Counterfactual Quantum Cryptography
We present a new quantum bit commitment (QBC) protocol based on counterfactual quantum cryptography. We analyze the security of this protocol, find that it can resist the attack presented by QBC’s no-go theorem. Our protocol is simple, and probably gives a new way of constructing QBC protocol.
متن کاملEntropy Security in Quantum Cryptography
Quantum mechanics is the basic principle which is applied in the cryptographic scenario of quantum cryptography. Present paper provides a conceptual framework on the high level security protocol in Quantum cryptography. This is used as a base for data security through quantum computing in modern cryptosystem. In this paper first of all a detailed description of BB84 protocol with noise and with...
متن کاملEntropic security in quantum cryptography
We present two new definitions of security for quantum ciphers which are inspired by the definition of entropic security and entropic indistinguishability defined by Dodis and Smith. We prove the equivalence of these two new definitions. We also propose a generalization of a cipher described by Dodis and Smith and show that it can actually encrypt n qubits using less than n bits of key under re...
متن کاملNetwork Security Using Quantum Cryptography
Network security and cryptography is a subject about how to protect information in digital form and to provide security services. The purpose of a digital signature is to provide a means for an entity to bind its identity to a piece of information. The common attacks on digital signature were reviewed. The first method was the RSA signature scheme, which remains today one of the most practical ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Physical Review A
سال: 2010
ISSN: 1050-2947,1094-1622
DOI: 10.1103/physreva.82.042335