700 research outputs found
Quantum secure direct communication based on supervised teleportation
We present a quantum secure direct communication(QSDC) scheme as an extension
for a proposed supervised secure entanglement sharing protocol. Starting with a
quick review on the supervised entanglement sharing protocol -- the "Wuhan"
protocol [Y. Li and Y. Liu, arXiv:0709.1449v2], we primarily focus on its
further extend using for a QSDC task, in which the communication attendant
Alice encodes the secret message directly onto a sequence of 2-level particles
which then can be faithfully teleported to Bob using the shared maximal
entanglement states obtained by the previous "Wuhan" protocol. We also evaluate
the security of the QSDC scheme, where an individual self-attack performed by
Alice and Bob -- the out of control attack(OCA) is introduced and the
robustness of our scheme on the OCA is documented.Comment: 5 pages, 1 table, oral contribution in the Conference on Quantum
Optics and Applications in Computing and Communications, Photonics Asia 2007,
Proc. of SPI
Quantum cryptography: key distribution and beyond
Uniquely among the sciences, quantum cryptography has driven both
foundational research as well as practical real-life applications. We review
the progress of quantum cryptography in the last decade, covering quantum key
distribution and other applications.Comment: It's a review on quantum cryptography and it is not restricted to QK
Quantum secret sharing based on modulated high-dimensional time-bin entanglement
We propose a new scheme for quantum secret sharing (QSS) that uses a
modulated high-dimensional time-bin entanglement. By modulating the relative
phase randomly by {0,pi}, a sender with the entanglement source can randomly
change the sign of the correlation of the measurement outcomes obtained by two
distant recipients. The two recipients must cooperate if they are to obtain the
sign of the correlation, which is used as a secret key. We show that our scheme
is secure against intercept-and-resend (I-R) and beam splitting attacks by an
outside eavesdropper thanks to the non-orthogonality of high-dimensional
time-bin entangled states. We also show that a cheating attempt based on an I-R
attack by one of the recipients can be detected by changing the dimension of
the time bin entanglement randomly and inserting two "vacant" slots between the
packets. Then, cheating attempts can be detected by monitoring the count rate
in the vacant slots. The proposed scheme has better experimental feasibility
than previously proposed entanglement-based QSS schemes.Comment: To appear in Phys. Rev.
Conference Key Agreement and Quantum Sharing of Classical Secrets with Noisy GHZ States
We propose a wide class of distillation schemes for multi-partite entangled
states that are CSS-states. Our proposal provides not only superior efficiency,
but also new insights on the connection between CSS-states and bipartite graph
states. We then consider the applications of our distillation schemes for two
cryptographic tasks--namely, (a) conference key agreement and (b) quantum
sharing of classical secrets. In particular, we construct
``prepare-and-measure'' protocols. Also we study the yield of those protocols
and the threshold value of the fidelity above which the protocols can function
securely. Surprisingly, our protocols will function securely even when the
initial state does not violate the standard Bell-inequalities for GHZ states.
Experimental realization involving only bi-partite entanglement is also
suggested.Comment: 5 pages, to appear in Proc. 2005 IEEE International Symposium on
Information Theory (ISIT 2005, Adelaide, Australia
Quantum e-commerce: A comparative study of possible protocols for online shopping and other tasks related to e-commerce
A set of quantum protocols for online shopping is proposed and analyzed to
establish that it is possible to perform secure online shopping using different
types of quantum resources. Specifically, a single photon based, a Bell state
based and two 3-qubit entangled state based quantum online shopping schemes are
proposed. The Bell state based scheme, being a completely orthogonal state
based protocol, is fundamentally different from the earlier proposed schemes
which were based on conjugate coding. One of the 3-qubit entangled state based
scheme is build on the principle of entanglement swapping which enables us to
accomplish the task without transmission of the message encoded qubits through
the channel. Possible ways of generalizing the entangled state based schemes
proposed here to the schemes which use multiqubit entangled states is also
discussed. Further, all the proposed protocols are shown to be free from the
limitations of the recently proposed protocol of Huang et al. (Quantum Inf.
Process. 14, 2211-2225, 2015) which allows the buyer (Alice) to change her
order at a later time (after initially placing the order and getting it
authenticated by the controller). The proposed schemes are also compared with
the existing schemes using qubit efficiency.Comment: It's shown that quantum e-commerce is not a difficult task, and it
can be done in various way
Key distillation from quantum channels using two-way communication protocols
We provide a general formalism to characterize the cryptographic properties
of quantum channels in the realistic scenario where the two honest parties
employ prepare and measure protocols and the known two-way communication
reconciliation techniques. We obtain a necessary and sufficient condition to
distill a secret key using this type of schemes for Pauli qubit channels and
generalized Pauli channels in higher dimension. Our results can be applied to
standard protocols such as BB84 or six-state, giving a critical error rate of
20% and 27.6%, respectively. We explore several possibilities to enlarge these
bounds, without any improvement. These results suggest that there may exist
weakly entangling channels useless for key distribution using prepare and
measure schemes.Comment: 21 page
- …