Secure Key Distribution via Pre- and Post-Selected Quantum Ensembles
نویسنده
چکیده
A quantum key distribution scheme whose security depends on the features of preand post-selected quantum ensembles is described. PACS numbers: 03.65.Bz, 42.80.Sa, 89.70.+c A wide variety of quantum key distribution schemes have been proposed, following the original Bennett and Brassard protocol [1]. Ekert [2] has described a scheme in which two parties, Alice and Bob, create a shared random key by performing spin measurements on pairs of spin2 particles in the singlet state. The particle pairs are emitted by a source towards Alice and Bob, who each measure spin along three different directions, chosen randomly and independently for each pair. After a sequence of measurements on an appropriate number of pairs, Alice and Bob announce the directions of their measurements publicly and divide the measurements into two groups: those in which they measured the spin in different directions, and those in which they measured the spin in the same direction. They publicly reveal the outcomes of the first group of measurements and use these to check that the singlet states have not been disturbed by an eavesdropper, Eve. Essentially, they calculate a correlation coefficient: any attempt by Eve to monitor the particles will disturb the singlet state and result in a correlation coefficient that is bounded by Bell’s inequality and is hence distinguishable from the ∗Email address: [email protected]
منابع مشابه
New Insights on Time-Symmetry in Quantum Mechanics
The " time-asymmetry " attributed to the standard formulation of Quantum Mechanics (QM) was inherited from a reasonable tendency learned from Classical Mechanics (CM) to predict the future based on initial conditions: once the equations of motion are fixed in CM, then the initial and final conditions are not independent, only one can be fixed arbitrarily. In contrast, as a result of the uncerta...
متن کاملAn efficient solution for management of pre-distribution in wireless sensor networks
A sensor node is composed of different parts including processing units, sensor, transmitter, receiver, and security unit. There are many nodes in a sensor unit. These networks can be used for military, industrial, medicine, environmental, house, and many other applications. These nodes may be established in the lands of enemies to monitor the relations. Hence, it is important to consider conse...
متن کاملThe Curious Quantum Mechanics of Pre- and Post-Selected Ensembles
In a provocative paper, (~) Albert, Aharonov, and D'Amato proposed an analysis of preand post-selected ensembles in quantum mechanics (PPS ensembles) which seemed to show that in the interval between preand post-selection, certain noncommuting observables all have determinate values. Moreover, these values are context dependent: The value assumed by a degenerate observable (e.g., an observable ...
متن کاملHybrid Key pre-distribution scheme for wireless sensor network based on combinatorial design
Key distribution is an important problem in wireless sensor networks where sensor nodesare randomly scattered in adversarial environments.Due to the random deployment of sensors, a list of keys must be pre-distributed to each sensor node before deployment. To establish a secure communication, two nodes must share common key from their key-rings. Otherwise, they can find a key- path in which ens...
متن کاملProtograph-based Quasi-Cyclic MDPC Codes for McEliece Cryptosystems
In this paper, ensembles of quasi-cyclic moderatedensity parity-check (MDPC) codes based on protographs are introduced and analyzed in the context of a McEliece-like cryptosystem. The proposed ensembles significantly improve the error correction capability of the regular MDPC code ensembles that are currently considered for post-quantum cryptosystems without increasing the public key size. The ...
متن کامل