SYMMETRIC COLLECTIVE ATTACKS FOR THE EAVESDROPPING OF SYMMETRIC QUANTUM KEY DISTRIBUTION
نویسندگان
چکیده
منابع مشابه
Symmetric Autocompensating Quantum Key Distribution
We present quantum key distribution schemes which are autocompensating (require no alignment) and symmetric (Alice and Bob receive photons from a central source) for both polarization and timebin qubits. The primary benefit of the symmetric configuration is that both Alice and Bob may have passive setups (neither Alice nor Bob is required to make active changes for each run of the protocol). We...
متن کاملSymmetric blind information reconciliation for quantum key distribution
E.O. Kiktenko, 2, 3 A.S. Trushechkin, C.C.W. Lim, Y.V. Kurochkin, and A.K. Fedorov 5 Russian Quantum Center, Skolkovo, Moscow 143025, Russia Theoretical Department, DEPHAN, Skolkovo, Moscow 143025, Russia Steklov Mathematical Institute of Russian Academy of Sciences, Moscow 119991, Russia Quantum Information Science Group, Computational Sciences and Engineering Division, Oak Ridge National Labo...
متن کاملImproved Eavesdropping Detection in Quantum Key Distribution
Employing the fundamental laws of quantum physics, Quantum Key Distribution (QKD) promises the unconditionally secure distribution of cryptographic keys. However, in practical realisations, a QKD protocol is only secure, when the quantum bit error rate introduced by an eavesdropper unavoidably exceeds the system error rate. This condition guarantees that an eavesdropper cannot disguise his pres...
متن کاملExpanded Conclusive Eavesdropping in Quantum Key Distribution
The paper [Howard E. Brandt, ”Conclusive eavesdropping in quantum key distribution,” J. Opt. B: Quantum Semiclass. Opt. 7 (2005)] is generalized to include the full range of error rates for the projectively measured quantum cryptographic entangling probe, and also the full range of inconclusive rates for the entangling probe measured with the POVM receiver.
متن کاملAn Online Threshold Key Distribution Scheme for Symmetric Key Management
The threshold secret sharing technique has been used extensively in cryptography. This technique is used for splitting secrets into shares and distributing the shares in the network to provide protection against attacks and to reduce the possibility of loss of information. In this paper, a new approach is introduced to enhance communication security among the nodes in a network based on the thr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Quantum Information
سال: 2008
ISSN: 0219-7499,1793-6918
DOI: 10.1142/s0219749908004080