305 research outputs found

    Weak randomness completely trounces the security of QKD

    Get PDF
    In usual security proofs of quantum protocols the adversary (Eve) is expected to have full control over any quantum communication between any communicating parties (Alice and Bob). Eve is also expected to have full access to an authenticated classical channel between Alice and Bob. Unconditional security against any attack by Eve can be proved even in the realistic setting of device and channel imperfection. In this Letter we show that the security of QKD protocols is ruined if one allows Eve to possess a very limited access to the random sources used by Alice. Such knowledge should always be expected in realistic experimental conditions via different side channels

    Entanglement swapping between multi-qudit systems

    Get PDF
    We generalize the entanglement swapping scheme originally proposed for two pairs of qubits to an arbitrary number qq of systems composed from an arbitrary number mjm_j of qudits. Each of the system is supposed to be prepared in a maximally entangled state of mjm_j qudits, while different systems are not correlated at all. We show that when a set j=1qaj\sum_{j=1}^q a_j particles (from each of the qq systems aja_j particles are measured) are subjected to a generalized Bell-type measurement, the resulting set of j=1q(mjaj)\sum_{j=1}^q (m_j-a_j) particles will collapse into a maximally entangled state

    Trajectories in the Context of the Quantum Newton's Law

    Full text link
    In this paper, we apply the one dimensional quantum law of motion, that we recently formulated in the context of the trajectory representation of quantum mechanics, to the constant potential, the linear potential and the harmonic oscillator. In the classically allowed regions, we show that to each classical trajectory there is a family of quantum trajectories which all pass through some points constituting nodes and belonging to the classical trajectory. We also discuss the generalization to any potential and give a new definition for de Broglie's wavelength in such a way as to link it with the length separating adjacent nodes. In particular, we show how quantum trajectories have as a limit when 0\hbar \to 0 the classical ones. In the classically forbidden regions, the nodal structure of the trajectories is lost and the particle velocity rapidly diverges.Comment: 17 pages, LateX, 6 eps figures, minor modifications, Title changed, to appear in Physica Script

    Purification and correlated measurements of bipartite mixed states

    Full text link
    We prove that all purifications of a non-factorable state (i.e., the state which cannot be expressed in a form ρAB=ρAρB\rho_{AB}=\rho_A\otimes\rho_B) are entangled. We also show that for any bipartite state there exists a pair of measurements which are correlated on this state if and only if the state is non-factorable.Comment: 4 revtex pages, to appear in Phys. Rev.

    The Relativistic Quantum Motions

    Full text link
    Using the relativistic quantum stationary Hamilton-Jacobi equation within the framework of the equivalence postulate, and grounding oneself on both relativistic and quantum Lagrangians, we construct a Lagrangian of a relativistic quantum system in one dimension and derive a third order equation of motion representing a first integral of the relativistic quantum Newton's law. Then, we plot the relativistic quantum trajectories of a particle moving under the constant and the linear potentials. We establish the existence of nodes and link them to the de Broglie's wavelength.Comment: Latex, 18 pages, 3 eps figure

    Fair and optimistic quantum contract signing

    Full text link
    We present a fair and optimistic quantum contract signing protocol between two clients that requires no communication with the third trusted party during the exchange phase. We discuss its fairness and show that it is possible to design such a protocol for which the probability of a dishonest client to cheat becomes negligible, and scales as N^{-1/2}, where N is the number of messages exchanged between the clients. Our protocol is not based on the exchange of signed messages: its fairness is based on the laws of quantum mechanics. Thus, it is abuse-free, and the clients do not have to generate new keys for each message during the Exchange phase. We discuss a real-life scenario when the measurement errors and qubit state corruption due to noisy channels occur and argue that for real, good enough measurement apparatus and transmission channels, our protocol would still be fair. Our protocol could be implemented by today's technology, as it requires in essence the same type of apparatus as the one needed for BB84 cryptographic protocol. Finally, we briefly discuss two alternative versions of the protocol, one that uses only two states (based on B92 protocol) and the other that uses entangled pairs, and show that it is possible to generalize our protocol to an arbitrary number of clients.Comment: 11 pages, 2 figure

    Optimality of private quantum channels

    Full text link
    We addressed the question of optimality of private quantum channels. We have shown that the Shannon entropy of the classical key necessary to securely transfer the quantum information is lower bounded by the entropy exchange of the private quantum channel E\cal E and von Neumann entropy of the ciphertext state ϱ(0)\varrho^{(0)}. Based on these bounds we have shown that decomposition of private quantum channels into orthogonal unitaries (if exists) is optimizing the entropy. For non-ancillary single qubit PQC we have derived the optimal entropy for arbitrary set of plaintexts. In particular, we have shown that except when the (closure of the) set of plaintexts contains all states, one bit key is sufficient. We characterized and analyzed all the possible single qubit private quantum channels for arbitrary set of plaintexts. For the set of plaintexts consisting of all qubit states we have characterized all possible approximate private quantum channels and we have derived the relation between the security parameter and the corresponding minimal entropy.Comment: no commen

    Preparation of polarization entangled mixed states of two photons

    Full text link
    We propose a scheme for preparing arbitrary two photons polarization entangled mixed states via controlled location decoherence. The scheme uses only linear optical devices and single-mode optical fibers, and may be feasible in experiment within current optical technology.Comment: 3 pages, 5 figs. The article has been rewritten. Discussion about experiment are added. To appear in Phys. Rev.
    corecore