Quantum Cryptography in Noiseless and Noisy Environment
ثبت نشده
چکیده
In this paper, three quantum key distribution protocols will be presented. The first protocol considered is the Ekert protocol for qubit systems based on the famous Einstein-Podolsky-Rosen experiment, and using the Bell inequality as a test of channel security. The Ekert protocol will then be extended to a qutrit system for our second protocol. Finally, a protocol based on mutually complementary observables will be studied. We will consider the security of these protocols under noiseless and noisy conditions, where for the latter case we have a symmetric incoherent attack carried out by an eavesdropper disguised as noise in the channel.
منابع مشابه
Quantum Cryptography in Noisy Channels
We provide a complete proof of the security of quantum cryptography against any eavesdropping attack including coherent measurements even in the presence of noise. Polarization-based cryptographic schemes are shown to be equivalent to EPR-based schemes. We also show that the performance of a noisy channel approaches that of a noiseless one as the error rate tends to zero. (i.e., the secrecy cap...
متن کاملClassical capacity of a noiseless quantum channel assisted by noisy entanglement
We derive the general formula for the capacity of a noiseless quantum channel assisted by an arbitrary amount of noisy entanglement. In the capacity formula, the role of mutual information is played by the ratio of the quantum mutual information and the von Neumann entropy of the sender’s part of the noisy entanglement. A consequence of our results is that bound entangled states cannot increase...
متن کاملUnconditional security of quantum key distribution over arbitrarily long distances
Quantum key distribution is widely thought to offer unconditional security in communication between two users. Unfortunately, a widely accepted proof of its security in the presence of source, device, and channel noises has been missing. This long-standing problem is solved here by showing that, given fault-tolerant quantum computers, quantum key distribution over an arbitrarily long distance o...
متن کاملar X iv : q ua nt - p h / 97 05 03 6 v 1 2 1 M ay 1 99 7 Data processing in quantum information theory
The strengthened data processing inequality have been proved. The general theory have been illustrated on the simple example. Quantum information theory is a new field with potential applications for the conceptual foundation of quantum mechanics. It appears to be the basis for a proper understanding of the emerging fields of quantum computation, communication and cryptography [1-4]. Quantum in...
متن کاملD ec 1 99 9 Unconditional Security Of Quantum Key Distribution Over Arbitrarily Long Distances ∗
Quantum key distribution is widely thought to offer unconditional security in communication between two users. Unfortunately, a widely accepted proof of its security in the presence of source, device and channel noises has been missing. This long-standing problem is solved here by showing that, given fault-tolerant quantum computers, quantum key distribution over an arbitrarily long distance of...
متن کامل