Security of quantum key distribution protocols using two-way classical communication or weak coherent pulses
نویسندگان
چکیده
A fundamental problem in cryptography is to enable two distant parties, traditionally called Alice and Bob, to communicate in absolute privacy, even in presence of an eavesdropper, Eve. It is a well known fact that a secret key, i.e., a randomly chosen bit string held by both Alice and Bob, but unknown to Eve, is sufficient to perform this task (one-time pad encryption). Thus, the problem of secret communication reduces to the problem of distributing a secret key.
منابع مشابه
Simultaneous quantum and classical communication using continuous variable
Conventionally, classical optical communication systems employing strong laser pulses and quantum key distribution (QKD) systems working at single-photon levels are quite different communication modalities. Dedicated devices are commonly required to implement QKD. Here we show these two can be implemented simultaneously using the same information carriers. More specially, we propose a coherent ...
متن کاملOptimal Experimental Scheme for Practical BB84 Quantum Key Distribution Protocol with Weak Coherent Sources, Noisy and Lossy Channel
It is the first scheme which allows the detection apparatus to achieve the photon number of arriving signals. Moreover, quantum bit error rates (QBERs) of multiphoton pulses can also be achieved precisely. Thus, our method is sensitive to the photon number splitting and resending (PNSR) attack, i.e., the eavesdropper (Eve) replaces one photon of the multiphoton pulse by a false one and forwards...
متن کاملSECURITY USING QUANTUM KEY DISTRIBUTION PROTOCOLS (QKDPs)
Most cryptographic mechanisms such as symmetric and asymmetric cryptography, often involve the use of cryptographic keys. However, all cryptographic techniques will be ineffective if the key distribution mechanism is weak. Quantum Key Distribution or Quantum Cryptography is attracting much attention as a solution of the problem of Key Distribution; QKD offers unconditionally secure communicatio...
متن کاملQuantum cryptography: from theory to practice
Quantum cryptography: from theory to practice Xiongfeng Ma Doctor of Philosophy Thesis Graduate Department of Department of Physics University of Toronto 2008 Quantum cryptography or quantum key distribution (QKD) applies fundamental laws of quantum physics to guarantee secure communication. The security of quantum cryptography was proven in the last decade. Many security analyses are based on ...
متن کاملSecurity analysis of the time-coding quantum key distribution protocols
We report the security analysis of time-coding quantum key distribution protocols. The protocols make use of coherent single-photon pulses. The key is encoded in the photon time-detection. The use of coherent superposition of states allows to detect eavesdropping of the key. We give a mathematical model of a first protocol from which we derive a second, simpler, protocol. We derive the security...
متن کامل