1,431,187 research outputs found
Giant Fiber Lasers: A New Paradigm for Secure Key Distribution
We propose and analyze a new concept for secure key distribution based on establishing laser oscillations between the sender and receiver. Compared to quantum mechanics based systems, our scheme allows for significantly higher key-establishing rates and longer ranges. By properly designing the laser structure, it is possible to increase the difficulty of eavesdropping almost arbitrarily, thus making our scheme an intriguing alternative and a complementary technology to quantum key-distribution systems
Effective Privacy Amplification for Secure Classical Communications
We study the practical effectiveness of privacy amplification for classical
key-distribution schemes. We find that in contrast to quantum key distribution
schemes, the high fidelity of the raw key generated in classical systems allow
the users to always sift a secure shorter key if they have an upper bound on
the eavesdropper probability to correctly guess the exchanged key-bits. The
number of privacy amplification iterations needed to achieve information leak
of 10^-8 in existing classical communicators is 2 or 3 resulting in a
corresponding slowdown 4 to 8. We analyze the inherent tradeoff between the
number of iterations and the security of the raw key. This property which is
unique to classical key distribution systems render them highly useful for
practical, especially for noisy channels where sufficiently low quantum bit
error ratios are difficult to achieve.Comment: 11 pages, 3 figure
Quantum Key Distribution over Probabilistic Quantum Repeaters
A feasible route towards implementing long-distance quantum key distribution
(QKD) systems relies on probabilistic schemes for entanglement distribution and
swapping as proposed in the work of Duan, Lukin, Cirac, and Zoller (DLCZ)
[Nature 414, 413 (2001)]. Here, we calculate the conditional throughput and
fidelity of entanglement for DLCZ quantum repeaters, by accounting for the DLCZ
self-purification property, in the presence of multiple excitations in the
ensemble memories as well as loss and other sources of inefficiency in the
channel and measurement modules. We then use our results to find the generation
rate of secure key bits for QKD systems that rely on DLCZ quantum repeaters. We
compare the key generation rate per logical memory employed in the two cases of
with and without a repeater node. We find the cross-over distance beyond which
the repeater system outperforms the non-repeater one. That provides us with the
optimum inter-node distancing in quantum repeater systems. We also find the
optimal excitation probability at which the QKD rate peaks. Such an optimum
probability, in most regimes of interest, is insensitive to the total distance.Comment: 12 pages, 6 figures; Fig. 5(a) is replace
The Case for Quantum Key Distribution
Quantum key distribution (QKD) promises secure key agreement by using quantum
mechanical systems. We argue that QKD will be an important part of future
cryptographic infrastructures. It can provide long-term confidentiality for
encrypted information without reliance on computational assumptions. Although
QKD still requires authentication to prevent man-in-the-middle attacks, it can
make use of either information-theoretically secure symmetric key
authentication or computationally secure public key authentication: even when
using public key authentication, we argue that QKD still offers stronger
security than classical key agreement.Comment: 12 pages, 1 figure; to appear in proceedings of QuantumComm 2009
Workshop on Quantum and Classical Information Security; version 2 minor
content revision
- …