280 research outputs found
A general scheme for information interception in the ping pong protocol
The existence of an undetectable eavesdropping of dense coded information has
been already demonstrated by Pavi\v{c}i\'c for the quantum direct communication
based on the ping-pong paradigm. However, a) the explicit scheme of the circuit
is only given and no design rules are provided, b) the existence of losses is
implicitly assumed, c) the attack has been formulated against qubit based
protocol only and it is not clear whether it can be adapted to higher
dimensional systems. These deficiencies are removed in the presented
contribution. A new generic eavesdropping scheme built on a firm theoretical
background is proposed. In contrast to the previous approach, it does not refer
to the properties of the vacuum state, so it is fully consistent with the
absence of losses assumption. Moreover, the scheme applies to the communication
paradigm based on signal particles of any dimensionality. It is also shown that
some well known attacks are special cases of the proposed scheme.Comment: 10 pages, 4 figure
Quantum Key Distribution Using Quantum Faraday Rotators
We propose a new quantum key distribution (QKD) protocol based on the fully
quantum mechanical states of the Faraday rotators. The protocol is
unconditionally secure against collective attacks for multi-photon source up to
two photons on a noisy environment. It is also robust against impersonation
attacks. The protocol may be implemented experimentally with the current
spintronics technology on semiconductors.Comment: 7 pages, 7 EPS figure
Quantum Conference
A notion of quantum conference is introduced in analogy with the usual notion
of a conference that happens frequently in today's world. Quantum conference is
defined as a multiparty secure communication task that allows each party to
communicate their messages simultaneously to all other parties in a secure
manner using quantum resources. Two efficient and secure protocols for quantum
conference have been proposed. The security and efficiency of the proposed
protocols have been analyzed critically. It is shown that the proposed
protocols can be realized using a large number of entangled states and group of
operators. Further, it is shown that the proposed schemes can be easily reduced
to protocol for multiparty quantum key distribution and some earlier proposed
schemes of quantum conference, where the notion of quantum conference was
different.Comment: 12 pages, 1 figur
- …