SYMMETRIC COLLECTIVE ATTACKS FOR THE EAVESDROPPING OF SYMMETRIC QUANTUM KEY DISTRIBUTION

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Symmetric Autocompensating Quantum Key Distribution

We present quantum key distribution schemes which are autocompensating (require no alignment) and symmetric (Alice and Bob receive photons from a central source) for both polarization and timebin qubits. The primary benefit of the symmetric configuration is that both Alice and Bob may have passive setups (neither Alice nor Bob is required to make active changes for each run of the protocol). We...

متن کامل

Symmetric blind information reconciliation for quantum key distribution

E.O. Kiktenko, 2, 3 A.S. Trushechkin, C.C.W. Lim, Y.V. Kurochkin, and A.K. Fedorov 5 Russian Quantum Center, Skolkovo, Moscow 143025, Russia Theoretical Department, DEPHAN, Skolkovo, Moscow 143025, Russia Steklov Mathematical Institute of Russian Academy of Sciences, Moscow 119991, Russia Quantum Information Science Group, Computational Sciences and Engineering Division, Oak Ridge National Labo...

متن کامل

Improved Eavesdropping Detection in Quantum Key Distribution

Employing the fundamental laws of quantum physics, Quantum Key Distribution (QKD) promises the unconditionally secure distribution of cryptographic keys. However, in practical realisations, a QKD protocol is only secure, when the quantum bit error rate introduced by an eavesdropper unavoidably exceeds the system error rate. This condition guarantees that an eavesdropper cannot disguise his pres...

متن کامل

Expanded Conclusive Eavesdropping in Quantum Key Distribution

The paper [Howard E. Brandt, ”Conclusive eavesdropping in quantum key distribution,” J. Opt. B: Quantum Semiclass. Opt. 7 (2005)] is generalized to include the full range of error rates for the projectively measured quantum cryptographic entangling probe, and also the full range of inconclusive rates for the entangling probe measured with the POVM receiver.

متن کامل

An Online Threshold Key Distribution Scheme for Symmetric Key Management

The threshold secret sharing technique has been used extensively in cryptography. This technique is used for splitting secrets into shares and distributing the shares in the network to provide protection against attacks and to reduce the possibility of loss of information. In this paper, a new approach is introduced to enhance communication security among the nodes in a network based on the thr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Quantum Information

سال: 2008

ISSN: 0219-7499,1793-6918

DOI: 10.1142/s0219749908004080