Quantum Cryptography in Noiseless and Noisy Environment

ثبت نشده
چکیده

In this paper, three quantum key distribution protocols will be presented. The first protocol considered is the Ekert protocol for qubit systems based on the famous Einstein-Podolsky-Rosen experiment, and using the Bell inequality as a test of channel security. The Ekert protocol will then be extended to a qutrit system for our second protocol. Finally, a protocol based on mutually complementary observables will be studied. We will consider the security of these protocols under noiseless and noisy conditions, where for the latter case we have a symmetric incoherent attack carried out by an eavesdropper disguised as noise in the channel.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Quantum Cryptography in Noisy Channels

We provide a complete proof of the security of quantum cryptography against any eavesdropping attack including coherent measurements even in the presence of noise. Polarization-based cryptographic schemes are shown to be equivalent to EPR-based schemes. We also show that the performance of a noisy channel approaches that of a noiseless one as the error rate tends to zero. (i.e., the secrecy cap...

متن کامل

Classical capacity of a noiseless quantum channel assisted by noisy entanglement

We derive the general formula for the capacity of a noiseless quantum channel assisted by an arbitrary amount of noisy entanglement. In the capacity formula, the role of mutual information is played by the ratio of the quantum mutual information and the von Neumann entropy of the sender’s part of the noisy entanglement. A consequence of our results is that bound entangled states cannot increase...

متن کامل

Unconditional security of quantum key distribution over arbitrarily long distances

Quantum key distribution is widely thought to offer unconditional security in communication between two users. Unfortunately, a widely accepted proof of its security in the presence of source, device, and channel noises has been missing. This long-standing problem is solved here by showing that, given fault-tolerant quantum computers, quantum key distribution over an arbitrarily long distance o...

متن کامل

ar X iv : q ua nt - p h / 97 05 03 6 v 1 2 1 M ay 1 99 7 Data processing in quantum information theory

The strengthened data processing inequality have been proved. The general theory have been illustrated on the simple example. Quantum information theory is a new field with potential applications for the conceptual foundation of quantum mechanics. It appears to be the basis for a proper understanding of the emerging fields of quantum computation, communication and cryptography [1-4]. Quantum in...

متن کامل

D ec 1 99 9 Unconditional Security Of Quantum Key Distribution Over Arbitrarily Long Distances ∗

Quantum key distribution is widely thought to offer unconditional security in communication between two users. Unfortunately, a widely accepted proof of its security in the presence of source, device and channel noises has been missing. This long-standing problem is solved here by showing that, given fault-tolerant quantum computers, quantum key distribution over an arbitrarily long distance of...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003