Security of EPR-based Quantum Key Distribution using three bases
نویسنده
چکیده
• m, the length (in bits) of the private key to be generated. • ǫ, the maximum threshold value for the error rate during the quantum transmission (ǫ < 1/4). • τ , a security constant such that ǫ 1−ǫ < ǫ 1−ǫ + τ < 1. • the security parameter r. It must be large enough so that Alice and Bob can find a binary matrix K of size m × r such that any linear combination of rows of K that contains at least one row of K has weight greater than dK = (
منابع مشابه
Quantum Cryptography in Noiseless and Noisy Environment
In this paper, three quantum key distribution protocols will be presented. The first protocol considered is the Ekert protocol for qubit systems based on the famous Einstein-Podolsky-Rosen experiment, and using the Bell inequality as a test of channel security. The Ekert protocol will then be extended to a qutrit system for our second protocol. Finally, a protocol based on mutually complementar...
متن کاملSecurity of EPR-based Quantum Key Distribution
We propose a proof of the security of EPR-based quantum key distribution against enemies with unlimited computational power. The proof holds for a protocol using interactive error-reconciliation scheme. We assume in this paper that the legitimate parties receive a given number of single photon signals and that their measurement devices are perfect.
متن کاملQuantum Key Distribution Based On Generating More Than One Secret Bit Per Shared EPR Pair
Given a shared EPR pair, two cooperative parties can obtain one bit of shared secret key by separately measuring the pair along the same basis. Apparently, the Holevo bound [1] suggests that they cannot obtain more than one secret bit per shared EPR pair. Here we show that they can do so by independently putting each of their EPR pairs in a Hilbert subspace which is unknown to the eavesdropper....
متن کاملMulti-particle and High-dimension Controlled Order Rearrangement Encryption Protocols
Based on the controlled order rearrange encryption (CORE) for quantum key distribution using EPR pairs[Fu.G.Deng and G.L.Long Phys.Rev.A68 (2003) 042315], we propose the generalized controlled order rearrangement encryption (GCORE) protocols of N qubits and N qutrits, concretely display them in the cases using 3-qubit, 2-qutrit maximally entangled basis states. We further indicate that our prot...
متن کامل0 Security of Continuous Variable Quantum Cryptography
We discuss a quantum key distribution scheme in which small phase and amplitude modulations of CW light beams carry the key information. The presence of EPR type correlations provides the quantum protection. We identify universal constraints on the level of shared information between the intended receiver (Bob) and any eavesdropper (Eve) and use this to make a general evaluation of security. We...
متن کامل