5,358 research outputs found
Quantum key distribution session with 16-dimensional photonic states
The secure transfer of information is an important problem in modern
telecommunications. Quantum key distribution (QKD) provides a solution to this
problem by using individual quantum systems to generate correlated bits between
remote parties, that can be used to extract a secret key. QKD with
D-dimensional quantum channels provides security advantages that grow with
increasing D. However, the vast majority of QKD implementations has been
restricted to two dimensions. Here we demonstrate the feasibility of using
higher dimensions for real-world quantum cryptography by performing, for the
first time, a fully automated QKD session based on the BB84 protocol with
16-dimensional quantum states. Information is encoded in the single-photon
transverse momentum and the required states are dynamically generated with
programmable spatial light modulators. Our setup paves the way for future
developments in the field of experimental high-dimensional QKD.Comment: 8 pages, 3 figure
Reply to Comment on "Quantum dense key distribution"
In this Reply we propose a modified security proof of the Quantum Dense Key
Distribution protocol detecting also the eavesdropping attack proposed by
Wojcik in his Comment.Comment: To appear on PRA with minor change
Security against individual attacks for realistic quantum key distribution
I prove the security of quantum key distribution against individual attacks
for realistic signals sources, including weak coherent pulses and
downconversion sources. The proof applies to the BB84 protocol with the
standard detection scheme (no strong reference pulse). I obtain a formula for
the secure bit rate per time slot of an experimental setup which can be used to
optimize the performance of existing schemes for the considered scenario.Comment: 10 pages, 4 figure
Defeating classical bit commitments with a quantum computer
It has been recently shown by Mayers that no bit commitment scheme is secure
if the participants have unlimited computational power and technology. However
it was noticed that a secure protocol could be obtained by forcing the cheater
to perform a measurement. Similar situations had been encountered previously in
the design of Quantum Oblivious Transfer. The question is whether a classical
bit commitment could be used for this specific purpose. We demonstrate that,
surprisingly, classical unconditionally concealing bit commitments do not help.Comment: 13 pages. Supersedes quant-ph/971202
- …