Simulating Security of Quantum Protocols Under Channel Error Conditions

نویسندگان

  • J. Joel vanBrandwijk
  • Abhishek Parakh
چکیده

Security of quantum key exchange depends on successfully detecting the presence of an eavesdropper. In most cases this is done by comparing the errors introduced by an eavesdropper with the channel error rate. In other words, the communicating parties must tolerate some errors without losing a significant amount of key information. In this paper, we characterize the effects of amplitude damping errors on quantum key distribution protocols and explore allowable tolerances. Through simulations we observe that the effect of these errors, in some cases, is highly dependent on where the eavesdropper is located on the channel.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Alternative Quantum Cryptography

Security of quantum key distribution of existing quantum cryptographic protocols basically pure state protocols has yet to be unconditionally, unquestionably and realistically proved. We observe that this objective, in an alternative way, can be reliably fulfilled if security is guaranteed within the raw protocol. But in presence of noise, existing raw protocols can not ensure that security sin...

متن کامل

Quantum Cryptography in Noiseless and Noisy Environment

In this paper, three quantum key distribution protocols will be presented. The first protocol considered is the Ekert protocol for qubit systems based on the famous Einstein-Podolsky-Rosen experiment, and using the Bell inequality as a test of channel security. The Ekert protocol will then be extended to a qutrit system for our second protocol. Finally, a protocol based on mutually complementar...

متن کامل

Dual universality of hash functions and its applications to classical and quantum cryptography

In this paper, we introduce the concept of dual universality of hash functions and present its applications to various quantum and classical communication models including cryptography. We begin by establishing the one-to-one correspondence between a linear function family F and a code family C, and thereby defining ε-almost dual universal2 hash functions, as a generalization of the conventiona...

متن کامل

Asynchronous Operations on Qubits in Distributed Simulation Environments using QooSim

Operations on a pair of entangled qubits are conventionally presented as the application of the tensor product of operations. The tensor product is linearly extended to act synchronously across the entire entangled system. When simulating an entangled system, the conventional approach is possible and practical if both parts of the entangled system exist within the same physical simulator. Howev...

متن کامل

Capacity Achieving Codes for the Wire Tap Channel with Applications to Quantum Key Distribution

With the advent of quantum key distribution (QKD) systems, perfect (i.e. information-theoretic) security can now be achieved for distribution of a cryptographic key. QKD systems and similar protocols use classical error-correcting codes for both error correction (for the honest parties to correct errors) and privacy amplification (to make an eavesdropper fully ignorant). From a coding perspecti...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016