4,090 research outputs found
An arbitrated quantum signature scheme
The general principle for a quantum signature scheme is proposed and
investigated based on ideas from classical signature schemes and quantum
cryptography. The suggested algorithm is implemented by a symmetrical quantum
key cryptosystem and Greenberger-Horne-Zeilinger (GHZ) triplet states and
relies on the availability of an arbitrator. We can guarantee the unconditional
security of the algorithm, mostly due to the correlation of the GHZ triplet
states and the use of quantum one-time pads.Comment: 10 pages, no figures. Phys. Rev. A 65, (In press
Insecurity of Quantum Secure Computations
It had been widely claimed that quantum mechanics can protect private
information during public decision in for example the so-called two-party
secure computation. If this were the case, quantum smart-cards could prevent
fake teller machines from learning the PIN (Personal Identification Number)
from the customers' input. Although such optimism has been challenged by the
recent surprising discovery of the insecurity of the so-called quantum bit
commitment, the security of quantum two-party computation itself remains
unaddressed. Here I answer this question directly by showing that all
``one-sided'' two-party computations (which allow only one of the two parties
to learn the result) are necessarily insecure. As corollaries to my results,
quantum one-way oblivious password identification and the so-called quantum
one-out-of-two oblivious transfer are impossible. I also construct a class of
functions that cannot be computed securely in any ``two-sided'' two-party
computation. Nevertheless, quantum cryptography remains useful in key
distribution and can still provide partial security in ``quantum money''
proposed by Wiesner.Comment: The discussion on the insecurity of even non-ideal protocols has been
greatly extended. Other technical points are also clarified. Version accepted
for publication in Phys. Rev.
Continuous Variable Quantum Cryptography - beating the 3 dB loss limit
We demonstrate that secure quantum key distribution systems based on
continuous variables implementations can operate beyond the apparent 3 dB loss
limit that is implied by the beam splitting attack . The loss limit was
established for standard minimum uncertainty states such as coherent states. We
show that by an appropriate postselection mechanism we can enter a region where
Eve's knowledge falls behind the information shared between Alice and Bob even
in the presence of substantial losses.Comment: 4 pages, 2 figure
- …