4,690 research outputs found

    Quantum Cryptography with Imperfect Apparatus

    Get PDF
    Quantum key distribution, first proposed by Bennett and Brassard, provides a possible key distribution scheme whose security depends only on the quantum laws of physics. So far the protocol has been proved secure even under channel noise and detector faults of the receiver, but is vulnerable if the photon source used is imperfect. In this paper we propose and give a concrete design for a new concept, {\it self-checking source}, which requires the manufacturer of the photon source to provide certain tests; these tests are designed such that, if passed, the source is guaranteed to be adequate for the security of the quantum key distribution protocol, even though the testing devices may not be built to the original specification. The main mathematical result is a structural theorem which states that, for any state in a Hilbert space, if certain EPR-type equations are satisfied, the state must be essentially the orthogonal sum of EPR pairs.Comment: 7 pages (To appear in FOCS 98

    Fair Deals for Watershed Services: Lessons from a Multi-country Action-learning Project

    Get PDF
    Payments for ecosystem services make good sense. In the case of watershed ecosystems, downstream beneficiaries of wise upstream land and water stewardship should compensate these upstream stewards. These 'payments for watershed services' (PWS) should contribute to the costs of watershed management and, if upstream communities are also characterised by poverty, these payments should contribute to local development and poverty reduction as well. Debates about both conservation and development have seen a wave of excitement about payments for watershed services in recent years. But on the ground an equivalent surge of action is harder to see. IIED and its partners have been building on earlier international case study work to set up new PWS schemes - to 'learn by doing' and to improve our understanding of the opportunities and the challenges.This report is about the complex business of trying to put a simple conservation and development idea into practice. The idea is that watershed degradation in developing countries might be better tackled than it currently is if downstream beneficiaries of wise land use in watershed areas paid for these benefits. There are some examples around the world of this idea being put into practice - this report reviews these and describes what happened when teams in six developing countries set about exploring how the idea works on the ground

    Why Quantum Bit Commitment And Ideal Quantum Coin Tossing Are Impossible

    Get PDF
    There had been well known claims of unconditionally secure quantum protocols for bit commitment. However, we, and independently Mayers, showed that all proposed quantum bit commitment schemes are, in principle, insecure because the sender, Alice, can almost always cheat successfully by using an Einstein-Podolsky-Rosen (EPR) type of attack and delaying her measurements. One might wonder if secure quantum bit commitment protocols exist at all. We answer this question by showing that the same type of attack by Alice will, in principle, break any bit commitment scheme. The cheating strategy generally requires a quantum computer. We emphasize the generality of this ``no-go theorem'': Unconditionally secure bit commitment schemes based on quantum mechanics---fully quantum, classical or quantum but with measurements---are all ruled out by this result. Since bit commitment is a useful primitive for building up more sophisticated protocols such as zero-knowledge proofs, our results cast very serious doubt on the security of quantum cryptography in the so-called ``post-cold-war'' applications. We also show that ideal quantum coin tossing is impossible because of the EPR attack. This no-go theorem for ideal quantum coin tossing may help to shed some lights on the possibility of non-ideal protocols.Comment: We emphasize the generality of this "no-go theorem". All bit commitment schemes---fully quantum, classical and quantum but with measurements---are shown to be necessarily insecure. Accepted for publication in a special issue of Physica D. About 18 pages in elsart.sty. This is an extended version of an earlier manuscript (quant-ph/9605026) which has appeared in the proceedings of PHYSCOMP'9
    • …
    corecore