Quantum Cryptography with Imperfect Apparatus
نویسندگان
چکیده
Quantum key distribution, first proposed by Bennett and Brassard, provides a possible key distribution scheme whose security depends only on the quantum laws of physics. So far the protocol has been proved secure even under channel noise and detector faults of the receiver, but is vulnerable if the photon source used is imperfect. In this paper we propose and give a concrete design for a new concept, self-checking source, which requires the manufacturer of the photon source to provide certain tests; these tests are designed such that, if passed, the source is guaranteed to be adequate for the security of the quantum key distribution protocol, even though the testing devices may not be built to the original specification. The main mathematical result is a structural theorem which states that, for any state in a Hilbert space, if certain EPR-type equations are satisfied, the state must be essentially the orthogonal sum of EPR pairs.
منابع مشابه
A Practical Scheme for Entanglement Concentration
We present a realistic purification scheme for pure non-maximally entangled states. In the scheme, Alice and Bob at two distant parties first start with two shared but less entangled photon pairs to produce a conditional four-photon GHZ state, then perform a 45◦ polarization measurement onto one of the two photons at each party such that the remaining two photons are projected onto a maximally ...
متن کاملTwo-way Protocol for Quantum Cryptography with Imperfect Devices
The security of a deterministic quantum scheme for communication, namely the LM05 [1], is studied in presence of a lossy channel under the assumption of imperfect generation and detection of single photons. It is shown that the scheme allows for a rate of distillable secure bits higher than that pertaining to BB84 [2]. We report on a first implementation of LM05 with weak pulses.
متن کاملOptimal Robust Self-Testing by Binary Nonlocal XOR Games
Self-testing a quantum apparatus means verifying the existence of a certain quantum state as well as the effect of the associated measuring devices based only on the statistics of the measurement outcomes. Robust (i.e., error-tolerant) self-testing quantum apparatuses are critical building blocks for quantum cryptographic protocols that rely on imperfect or untrusted devices. We devise a genera...
متن کاملFair and optimistic quantum contract signing
We present a fair and optimistic [7, 8] quantum contract signing protocol between two clients that requires no communication with the third trusted party during the exchange phase. We discuss its fairness and show that it is possible to design such a protocol for which the probability of a dishonest client to cheat becomes negligible, and scales as N−1/2, where N is the number of messages excha...
متن کاملGeneralized Quantum Shannon Impossibility for Quantum Encryption
The famous Shannon impossibility result says that any encryption scheme with perfect secrecy requires a secret key at least as long as the message. In this paper we prove its quantum analogue with imperfect secrecy and imperfect correctness. We also provide a systematic study of information-theoretically secure quantum encryption with two secrecy definitions.
متن کامل