18,428 research outputs found
Quantum cryptography: key distribution and beyond
Uniquely among the sciences, quantum cryptography has driven both
foundational research as well as practical real-life applications. We review
the progress of quantum cryptography in the last decade, covering quantum key
distribution and other applications.Comment: It's a review on quantum cryptography and it is not restricted to QK
Quantum Cryptography
Quantum cryptography is a new method for secret communications offering the
ultimate security assurance of the inviolability of a Law of Nature. In this
paper we shall describe the theory of quantum cryptography, its potential
relevance and the development of a prototype system at Los Alamos, which
utilises the phenomenon of single-photon interference to perform quantum
cryptography over an optical fiber communications link.Comment: 36 pages in compressed PostScript format, 10 PostScript figures
compressed tar fil
Quantum Cryptography
Quantum cryptography could well be the first application of quantum mechanics
at the individual quanta level. The very fast progress in both theory and
experiments over the recent years are reviewed, with emphasis on open questions
and technological issues.Comment: 55 pages, 32 figures; to appear in Reviews of Modern Physic
Free-Space Quantum Key Distribution
Based on the firm laws of physics rather than unproven foundations of
mathematical complexity, quantum cryptography provides a radically different
solution for encryption and promises unconditional security. Quantum
cryptography systems are typically built between two nodes connected to each
other through fiber optic. This chapter focuses on quantum cryptography systems
operating over free-space optical channels as a cost-effective and license-free
alternative to fiber optic counterparts. It provides an overview of the
different parts of an experimental free-space quantum communication link
developed in the Spanish National Research Council (Madrid, Spain).Comment: 22 pages, 15 figure
Tomographic Quantum Cryptography
We present a protocol for quantum cryptography in which the data obtained for
mismatched bases are used in full for the purpose of quantum state tomography.
Eavesdropping on the quantum channel is seriously impeded by requiring that the
outcome of the tomography is consistent with unbiased noise in the channel. We
study the incoherent eavesdropping attacks that are still permissible and
establish under which conditions a secure cryptographic key can be generated.
The whole analysis is carried out for channels that transmit quantum systems of
any finite dimension.Comment: REVTeX4, 9 pages, 3 figures, 1 tabl
Counterfactual Quantum Cryptography
Quantum cryptography allows one to distribute a secret key between two remote
parties using the fundamental principles of quantum mechanics. The well-known
established paradigm for the quantum key distribution relies on the actual
transmission of signal particle through a quantum channel. This paper shows
that the task of a secret key distribution can be accomplished even though a
particle carrying secret information is not in fact transmitted through the
quantum channel. The proposed protocols can be implemented with current
technologies and provide practical security advantages by eliminating the
possibility that an eavesdropper can directly access the entire quantum system
of each signal particle.Comment: 19 pages, 1 figure; a little ambiguity in the version 1 removed;
abstract, text, references, and appendix revised; suggestions and comments
are highly appreciate
- …