Quantum key distribution relied on trusted information center
نویسندگان
چکیده
Quantum correlation between two particles and among three particles show nonclassic properties that can be used for providing secure transmission of information. In this paper, we propose two quantum key distribution schemes for quantum cryptographic network, which use the correlation properties of two and three particles. One is implemented by the Greenberger-Horne-Zeilinger state, and another is implemented by the Bell states. These schemes need a trusted information center like that in the classic cryptography. The optimal efficiency of the proposed protocols are higher than that in the previous schemes.
منابع مشابه
Secured Communication Protocol via Encrypted Key Ensuring Message Integrity
The Secured communication protocol via encrypted key ensuring message integrity combination of Authentication of Third Party Authentication Quantum Key Distribute Protocol (implicit) and Third Party Authentication Quantum Key Distribute Protocol Mutual Authentication (explicit) quantum cryptography is used to provide authenticated secure communication between sender and Receiver. In quantum cry...
متن کاملSecurity of trusted repeater quantum key distribution networks
A Quantum Key Distribution (QKD) network is an infrastructure capable of performing long-distance and high-rate secret key agreement with information-theoretic security. In this paper we study security properties of QKD networks based on trusted repeater nodes. Such networks can already be deployed, based on current technology. We present an example of a trusted repeater QKD network, developed ...
متن کاملQuantum key distribution with trusted quantum relay
A trusted quantum relay is introduced to enable quantum key distribution links to form the basic legs in a quantum key distribution network. The idea is based on the well-known intercept/resend eavesdropping. The same scheme can be used to make quantum key distribution between several parties. No entanglement is required.
متن کاملDeterministic and Efficient Three-party Quantum Key Distribution
The field of quantum computing is based on the laws of quantum mechanics, including states superposition and entanglement. Quantum cryptography is amongst the most surprising applications of quantum mechanics in quantum information processing. Remote state preparation allows a known state to a sender to be remotely prepared at a receiver’s location when they prior share entanglement and transmi...
متن کاملTrusted noise in continuous-variable quantum key distribution
We address the role of the phase-insensitive trusted preparation and detection noise in the security of a continuous-variable quantum key distribution, considering the Gaussian protocols on the basis of coherent and squeezed states and studying them in the conditions of Gaussian lossy and noisy channels. The influence of such a noise on the security of Gaussian quantum cryptography can be cruci...
متن کامل