Secure Key Distribution via Pre- and Post-Selected Quantum Ensembles

نویسنده

  • Jeffrey Bub
چکیده

A quantum key distribution scheme whose security depends on the features of preand post-selected quantum ensembles is described. PACS numbers: 03.65.Bz, 42.80.Sa, 89.70.+c A wide variety of quantum key distribution schemes have been proposed, following the original Bennett and Brassard protocol [1]. Ekert [2] has described a scheme in which two parties, Alice and Bob, create a shared random key by performing spin measurements on pairs of spin2 particles in the singlet state. The particle pairs are emitted by a source towards Alice and Bob, who each measure spin along three different directions, chosen randomly and independently for each pair. After a sequence of measurements on an appropriate number of pairs, Alice and Bob announce the directions of their measurements publicly and divide the measurements into two groups: those in which they measured the spin in different directions, and those in which they measured the spin in the same direction. They publicly reveal the outcomes of the first group of measurements and use these to check that the singlet states have not been disturbed by an eavesdropper, Eve. Essentially, they calculate a correlation coefficient: any attempt by Eve to monitor the particles will disturb the singlet state and result in a correlation coefficient that is bounded by Bell’s inequality and is hence distinguishable from the ∗Email address: [email protected]

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

New Insights on Time-Symmetry in Quantum Mechanics

The " time-asymmetry " attributed to the standard formulation of Quantum Mechanics (QM) was inherited from a reasonable tendency learned from Classical Mechanics (CM) to predict the future based on initial conditions: once the equations of motion are fixed in CM, then the initial and final conditions are not independent, only one can be fixed arbitrarily. In contrast, as a result of the uncerta...

متن کامل

An efficient solution for management of pre-distribution in wireless sensor networks

A sensor node is composed of different parts including processing units, sensor, transmitter, receiver, and security unit. There are many nodes in a sensor unit. These networks can be used for military, industrial, medicine, environmental, house, and many other applications. These nodes may be established in the lands of enemies to monitor the relations. Hence, it is important to consider conse...

متن کامل

The Curious Quantum Mechanics of Pre- and Post-Selected Ensembles

In a provocative paper, (~) Albert, Aharonov, and D'Amato proposed an analysis of preand post-selected ensembles in quantum mechanics (PPS ensembles) which seemed to show that in the interval between preand post-selection, certain noncommuting observables all have determinate values. Moreover, these values are context dependent: The value assumed by a degenerate observable (e.g., an observable ...

متن کامل

Hybrid Key pre-distribution scheme for wireless sensor network based on combinatorial design

Key distribution is an important problem in wireless sensor networks where sensor nodesare randomly scattered in adversarial environments.Due to the random deployment of sensors, a list of keys must be pre-distributed to each sensor node before deployment. To establish a secure communication, two nodes must share common key from their key-rings. Otherwise, they can find a key- path in which ens...

متن کامل

Protograph-based Quasi-Cyclic MDPC Codes for McEliece Cryptosystems

In this paper, ensembles of quasi-cyclic moderatedensity parity-check (MDPC) codes based on protographs are introduced and analyzed in the context of a McEliece-like cryptosystem. The proposed ensembles significantly improve the error correction capability of the regular MDPC code ensembles that are currently considered for post-quantum cryptosystems without increasing the public key size. The ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2000