4 research outputs found
Security Proof Against Collective Attacks for an Experimentally Feasible Semi-Quantum Key Distribution Protocol
Semiquantum key distribution (SQKD) allows two parties (Alice and Bob) to
create a shared secret key, even if one of these parties (say, Alice) is
classical. However, most SQKD protocols suffer from severe practical security
problems when implemented using photons. The recently developed "Mirror
protocol" [Boyer, Katz, Liss, and Mor, Phys. Rev. A 96, 062335 (2017)] is an
experimentally feasible SQKD protocol overcoming those drawbacks. The Mirror
protocol was proven robust (namely, it was proven secure against a limited
class of attacks including all noiseless attacks), but its security in case
some noise is allowed (natural or due to eavesdropping) has not been proved
yet. Here we prove security of the Mirror protocol against a wide class of
quantum attacks (the "collective attacks"), and we evaluate the allowed noise
threshold and the resulting key rate.Comment: 17 pages; 3 figure
Quantum cryptography: key distribution and beyond
Uniquely among the sciences, quantum cryptography has driven both
foundational research as well as practical real-life applications. We review
the progress of quantum cryptography in the last decade, covering quantum key
distribution and other applications.Comment: It's a review on quantum cryptography and it is not restricted to QK
Quantum Cryptography: Key Distribution and Beyond
Uniquely among the sciences, quantum cryptography has driven both foundational research as well as practical real-life applications. We review the progress of quantum cryptography in the last decade, covering quantum key distribution and other applications.Quanta 2017; 6: 1–47