Side-Channel-Free Quantum Key Distribution

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Side-channel-free quantum key distribution.

Quantum key distribution (QKD) offers the promise of absolutely secure communications. However, proofs of absolute security often assume perfect implementation from theory to experiment. Thus, existing systems may be prone to insidious side-channel attacks that rely on flaws in experimental implementation. Here we replace all real channels with virtual channels in a QKD protocol, making the rel...

متن کامل

Quantum Key Search with Side Channel Advice

Recently, a number of results have been published that show how to combine classical cryptanalysis with quantum algorithms, thereby (potentially) achieving considerable speed-ups. We follow this trend but add a novel twist by considering how to utilise side channel leakage in a quantum setting. This is non-trivial because Grover’s algorithm deals with unstructured data, however we are intereste...

متن کامل

Free-space quantum key distribution

Quantum cryptography was introduced in the mid1980s [1] as a new method for generating the shared, secret random number sequences, or cryptographic keys, that are used in crypto-systems to provide communications security. The appeal of quantum cryptography is that its security is based on laws of Nature, in contrast to existing methods of key distribution that derive their security from the per...

متن کامل

Free-Space Quantum Key Distribution

Quantum key distribution is the most advanced technology to arise from the emerging field of quantum information. In fact, a few companies (MaqiQ Technologies and id Quantique) already offer commercial quantum key distribution products. But why so much excitement over QKD when our standard techniques serve just fine? Well the thing is that our standard techniques are safe only under certain ass...

متن کامل

Side-channel free quantum key distribution by Samuel L. Braunstein and Stefano Pirandola IN DEFENSE OF PRIVATE SPACES

In quantum cryptography unconditional security proofs are derived under the assumption that Alice's and Bob's apparata (private spaces) are completely inaccessible by an eavesdropper who, therefore, can only attack the signal systems which are transmitted through the quantum communication channel connecting the two parties. Under this assumption, secret-key rates and security thresholds are der...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Physical Review Letters

سال: 2012

ISSN: 0031-9007,1079-7114

DOI: 10.1103/physrevlett.108.130502