82 research outputs found
Quantum multiparty key distribution protocol without use of entanglement
We propose a quantum key distribution (QKD) protocol that enables three
parties agree at once on a shared common random bit string in presence of an
eavesdropper without use of entanglement. We prove its unconditional security
and analyze the key rate.Comment: 8 pages, no figur
Shor-Preskill Type Security-Proofs for Concatenated Bennett-Brassard 1984 Quantum Key Distribution Protocol
We discuss long code problems in the Bennett-Brassard 1984 (BB84) quantum key
distribution protocol and describe how they can be overcome by concatenation of
the protocol. Observing that concatenated modified Lo-Chau protocol finally
reduces to the concatenated BB84 protocol, we give the unconditional security
of the concatenated BB84 protocol.Comment: 4 pages, RevTe
Concatenated Quantum Codes Constructible in Polynomial Time: Efficient Decoding and Error Correction
A method for concatenating quantum error-correcting codes is presented. The
method is applicable to a wide class of quantum error-correcting codes known as
Calderbank-Shor-Steane (CSS) codes. As a result, codes that achieve a high rate
in the Shannon theoretic sense and that are decodable in polynomial time are
presented. The rate is the highest among those known to be achievable by CSS
codes. Moreover, the best known lower bound on the greatest minimum distance of
codes constructible in polynomial time is improved for a wide range.Comment: 16 pages, 3 figures. Ver.4: Title changed. Ver.3: Due to a request of
the AE of the journal, the present version has become a combination of
(thoroughly revised) quant-ph/0610194 and the former quant-ph/0610195.
Problem formulations of polynomial complexity are strictly followed. An
erroneous instance of a lower bound on minimum distance was remove
Key rate available from mismatched mesurements in the BB84 protocol and the uncertainty principle
We consider the mismatched measurements in the BB84 quantum key distribution
protocol, in which measuring bases are different from transmitting bases. We
give a lower bound on the amount of a secret key that can be extracted from the
mismatched measurements. Our lower bound shows that we can extract a secret key
from the mismatched measurements with certain quantum channels, such as the
channel over which the Hadamard matrix is applied to each qubit with high
probability. Moreover, the entropic uncertainty principle implies that one
cannot extract the secret key from both matched measurements and mismatched
ones simultaneously, when we use the standard information reconciliation and
privacy amplification procedure.Comment: 5 pages, no figure, ieice.cls. Title was changed from version 1. To
appear in IEICE Trans. Fundamentals (http://ietfec.oxfordjournals.org/), vol.
E91-A, no. 10, Oct. 200
Key rate available from mismatched mesurements in the BB84 protocol and the uncertainty principle
We consider the mismatched measurements in the BB84 quantum key distribution
protocol, in which measuring bases are different from transmitting bases. We
give a lower bound on the amount of a secret key that can be extracted from the
mismatched measurements. Our lower bound shows that we can extract a secret key
from the mismatched measurements with certain quantum channels, such as the
channel over which the Hadamard matrix is applied to each qubit with high
probability. Moreover, the entropic uncertainty principle implies that one
cannot extract the secret key from both matched measurements and mismatched
ones simultaneously, when we use the standard information reconciliation and
privacy amplification procedure.Comment: 5 pages, no figure, ieice.cls. Title was changed from version 1. To
appear in IEICE Trans. Fundamentals (http://ietfec.oxfordjournals.org/), vol.
E91-A, no. 10, Oct. 200
Quantum Repeater with Encoding
We propose a new approach to implement quantum repeaters for long distance
quantum communication. Our protocol generates a backbone of encoded Bell pairs
and uses the procedure of classical error correction during simultaneous
entanglement connection. We illustrate that the repeater protocol with simple
Calderbank-Shor-Steane (CSS) encoding can significantly extend the
communication distance, while still maintaining a fast key generation rate.Comment: 11 pages, 5 figures (add new section III with an explicit example and
new appendix A
Quantum Computing: Pro and Con
I assess the potential of quantum computation. Broad and important
applications must be found to justify construction of a quantum computer; I
review some of the known quantum algorithms and consider the prospects for
finding new ones. Quantum computers are notoriously susceptible to making
errors; I discuss recently developed fault-tolerant procedures that enable a
quantum computer with noisy gates to perform reliably. Quantum computing
hardware is still in its infancy; I comment on the specifications that should
be met by future hardware. Over the past few years, work on quantum computation
has erected a new classification of computational complexity, has generated
profound insights into the nature of decoherence, and has stimulated the
formulation of new techniques in high-precision experimental physics. A broad
interdisciplinary effort will be needed if quantum computers are to fulfill
their destiny as the world's fastest computing devices. (This paper is an
expanded version of remarks that were prepared for a panel discussion at the
ITP Conference on Quantum Coherence and Decoherence, 17 December 1996.)Comment: 17 pages, LaTeX, submitted to Proc. Roy. Soc. Lond. A, minor
correction
- …