40,326 research outputs found

    One-Way Entangled-Photon Autocompensating Quantum Cryptography

    Full text link
    A new quantum cryptography implementation is presented that combines one-way operation with an autocompensating feature that has hitherto only been available in implementations that require the signal to make a round trip between the users. Using the concept of advanced waves, it is shown that this new implementation is related to the round-trip implementations in the same way that Ekert's two-particle scheme is related to the original one-particle scheme of Bennett and Brassard. The practical advantages and disadvantages of the proposed implementation are discussed in the context of existing schemes.Comment: 5 pages, 1 figure; Minor edits--conclusions unchanged; accepted for publication in Physical Review

    Learning with Errors is easy with quantum samples

    Full text link
    Learning with Errors is one of the fundamental problems in computational learning theory and has in the last years become the cornerstone of post-quantum cryptography. In this work, we study the quantum sample complexity of Learning with Errors and show that there exists an efficient quantum learning algorithm (with polynomial sample and time complexity) for the Learning with Errors problem where the error distribution is the one used in cryptography. While our quantum learning algorithm does not break the LWE-based encryption schemes proposed in the cryptography literature, it does have some interesting implications for cryptography: first, when building an LWE-based scheme, one needs to be careful about the access to the public-key generation algorithm that is given to the adversary; second, our algorithm shows a possible way for attacking LWE-based encryption by using classical samples to approximate the quantum sample state, since then using our quantum learning algorithm would solve LWE

    Zero-Error Attacks and Detection Statistics in the Coherent One-Way Protocol for Quantum Cryptography

    Full text link
    This is a study of the security of the Coherent One-Way (COW) protocol for quantum cryptography, proposed recently as a simple and fast experimental scheme. In the zero-error regime, the eavesdropper Eve can only take advantage of the losses in the transmission. We consider new attacks, based on unambiguous state discrimination, which perform better than the basic beam-splitting attack, but which can be detected by a careful analysis of the detection statistics. These results stress the importance of testing several statistical parameters in order to achieve higher rates of secret bits

    Asymmetric cryptography and trapdoor one-way functions

    Get PDF
    The asymmetric-key (public-key) encryption scheme is considered to be the most important discovery in the history of cryptography. It is based on the use of two complementary keys generated according to a chosen trapdoor one-way function (TOWF). Since its first implementation, asymmetric encryption has revolutionized our way of communicating as well as the safety of information transfer, and it is now widely used around the world for various purposes, especially in the field of online transaction security. The safety of the asymmetric-key scheme relies on the assumption that any known cryptographic attack using an efficient problem-solving algorithm will not be able to succeed in applying the inverse (decryption) function onto the cryptogram in a polynomial time without additional knowledge (secret information). The most-challenging aspect of creating a new asymmetric cryptographic algorithm is selecting a one-way function for encryption purposes and finding a trapdoor in its inverse. In this paper, the concept of public-key cryptography will be explained using the RSA algorithm as an example. In addition, the review of the most-important functions that are considered to be trapdoor one-way functions will be conducted

    Continuous Variable Quantum Cryptography using Two-Way Quantum Communication

    Full text link
    Quantum cryptography has been recently extended to continuous variable systems, e.g., the bosonic modes of the electromagnetic field. In particular, several cryptographic protocols have been proposed and experimentally implemented using bosonic modes with Gaussian statistics. Such protocols have shown the possibility of reaching very high secret-key rates, even in the presence of strong losses in the quantum communication channel. Despite this robustness to loss, their security can be affected by more general attacks where extra Gaussian noise is introduced by the eavesdropper. In this general scenario we show a "hardware solution" for enhancing the security thresholds of these protocols. This is possible by extending them to a two-way quantum communication where subsequent uses of the quantum channel are suitably combined. In the resulting two-way schemes, one of the honest parties assists the secret encoding of the other with the chance of a non-trivial superadditive enhancement of the security thresholds. Such results enable the extension of quantum cryptography to more complex quantum communications.Comment: 12 pages, 7 figures, REVTe
    • …
    corecore