35 research outputs found
Quantum Cryptography with Imperfect Apparatus
Quantum key distribution, first proposed by Bennett and Brassard, provides a
possible key distribution scheme whose security depends only on the quantum
laws of physics. So far the protocol has been proved secure even under channel
noise and detector faults of the receiver, but is vulnerable if the photon
source used is imperfect. In this paper we propose and give a concrete design
for a new concept, {\it self-checking source}, which requires the manufacturer
of the photon source to provide certain tests; these tests are designed such
that, if passed, the source is guaranteed to be adequate for the security of
the quantum key distribution protocol, even though the testing devices may not
be built to the original specification. The main mathematical result is a
structural theorem which states that, for any state in a Hilbert space, if
certain EPR-type equations are satisfied, the state must be essentially the
orthogonal sum of EPR pairs.Comment: 7 pages (To appear in FOCS 98
Defeating classical bit commitments with a quantum computer
It has been recently shown by Mayers that no bit commitment scheme is secure
if the participants have unlimited computational power and technology. However
it was noticed that a secure protocol could be obtained by forcing the cheater
to perform a measurement. Similar situations had been encountered previously in
the design of Quantum Oblivious Transfer. The question is whether a classical
bit commitment could be used for this specific purpose. We demonstrate that,
surprisingly, classical unconditionally concealing bit commitments do not help.Comment: 13 pages. Supersedes quant-ph/971202