Quantum cryptography based on orthogonal states.
نویسندگان
چکیده
All existing quantum cryptosystems use non-orthogonal states as the carriers of information. Non-orthogonal states cannot be cloned (duplicated) by an eavesdropper. In result, any eavesdropping attempt must introduce errors in the transmission, and therefore, can be detected by the legal users of the communication channel. Orthogonal states are not used in quantum cryptography, since they can be faithfully cloned without altering the transmitted data. In this Letter we present a cryptographic scheme based on orthogonal states, which also assures the detection of any eavesdropper.
منابع مشابه
0 A Simple Proof of the Unconditional Security of Relativistic Quantum Cryptography
A simple proof of the unconditional security of a relativistic quantum cryptosystem based on orthogonal states is proposed. Restrictions imposed by special relativity allow to substantially simplify the proof compared with the non-relativistic cryptosystems involving non-orthogonal states. Important for the proposed protocol is the spatio-temporal structure of the quantum states which is actual...
متن کاملLong Distance Quantum Key Distribution without Quantum Memory
A quantum cryptography scheme for lossy channel is proposed which does not employ quantum memory. The scheme also does not use quantum codes and is rather simple for practical implementation. The goal of quantum cryptography is to secretly distribute the key (a string of bits) between the two spatially separated legitimate users. The existing quantum cryptography schemes can be classified into ...
متن کاملNo Cloning of Orthogonal States in Composite Systems
The no-cloning principle tells us that nonorthogonal quantum states cannot be cloned, but it does not tell us that orthogonal states can always be cloned. We suggest a situation where the cloning transformations are restricted, leading to a novel type of no-cloning principle. In the case of a composite system made of two subsystems: if the subsystems are only available one after the other then ...
متن کاملA Three-Stage Quantum Cryptography Protocol
We present a three-stage quantum cryptographic protocol based on public key cryptography in which each party uses its own secret key. Unlike the BB84 protocol, where the qubits are transmitted in only one direction and classical information exchanged thereafter, the communication in the proposed protocol remains quantum in each stage. A related system of key distribution is also described. Intr...
متن کاملFree space relativistic quantum cryptography with faint laser pulses
A new protocol for quantum key distribution through empty space is proposed. Apart from the quantum mechanical restrictions on distinguishability of non-orthogonal states, the protocol employs additional restrictions imposed by special relativity. The protocol ensures generation of a secure key even for the source generating non-strictly single-photon quantum states and for arbitrary losses in ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Physical review letters
دوره 75 7 شماره
صفحات -
تاریخ انتشار 1995