1,415 research outputs found

    Quantum Cloning, Eavesdropping and Bell's inequality

    Get PDF
    We analyze various eavesdropping strategies on a quantum cryptographic channel. We present the optimal strategy for an eavesdropper restricted to a two-dimensional probe, interacting on-line with each transmitted signal. The link between safety of the transmission and the violation of Bell's inequality is discussed. We also use a quantum copying machine for eavesdropping and for broadcasting quantum information.Comment: LaTex, 13 pages, with 6 Postscript figure

    Nonlinear quantum state transformation of spin-1/2

    Get PDF
    A non-linear quantum state transformation is presented. The transformation, which operates on pairs of spin-1/2, can be used to distinguish optimally between two non-orthogonal states. Similar transformations applied locally on each component of an entangled pair of spin-1/2 can be used to transform a mixed nonlocal state into a quasi-pure maximally entangled singlet state. In both cases the transformation makes use of the basic building block of the quantum computer, namely the quantum-XOR gate.Comment: 12 pages, LaTeX, amssym, epsfig (2 figures included

    Unambiguous state discrimination in quantum cryptography with weak coherent states

    Full text link
    The use of linearly independent signal states in realistic implementations of quantum key distribution (QKD) enables an eavesdropper to perform unambiguous state discrimination. We explore quantitatively the limits for secure QKD imposed by this fact taking into account that the receiver can monitor to some extend the photon number statistics of the signals even with todays standard detection schemes. We compare our attack to the beamsplitting attack and show that security against beamsplitting attack does not necessarily imply security against the attack considered here.Comment: 10 pages, 6 figures, updated version with added discussion of beamsplitting attac

    Security of quantum cryptography using balanced homodyne detection

    Full text link
    In this paper we investigate the security of a quantum cryptographic scheme which utilizes balanced homodyne detection and weak coherent pulse (WCP). The performance of the system is mainly characterized by the intensity of the WCP and postselected threshold. Two of the simplest intercept/resend eavesdropping attacks are analyzed. The secure key gain for a given loss is also discussed in terms of the pulse intensity and threshold.Comment: RevTeX4, 8pages, 7 figure

    Coherent pulse implementations of quantum cryptography protocols resistant to photon number splitting attacks

    Get PDF
    A new class of quantum cryptography (QC) protocols that are robust against the most general photon number splitting attacks in a weak coherent pulse implementation has been recently proposed. In this article we give a quite exhaustive analysis of several eavesdropping attacks on these schemes. The eavesdropper (Eve) is supposed to have unlimited technological power while the honest parties (Alice and Bob) use present day technology, in particular an attenuated laser as an approximation of a single-photon source. They exploit the nonorthogonality of quantum states for decreasing the information accessible to Eve in the multi-photon pulses accidentally produced by the imperfect source. An implementation of some of these protocols using present day technology allow for a secure key distribution up to distances of \sim 150 km. We also show that strong-pulse implementations, where a strong pulse is included as a reference, allow for key distribution robust against photon number splitting attacks.Comment: 16 pages, 11 figure

    Estimates for practical quantum cryptography

    Get PDF
    In this article I present a protocol for quantum cryptography which is secure against attacks on individual signals. It is based on the Bennett-Brassard protocol of 1984 (BB84). The security proof is complete as far as the use of single photons as signal states is concerned. Emphasis is given to the practicability of the resulting protocol. For each run of the quantum key distribution the security statement gives the probability of a successful key generation and the probability for an eavesdropper's knowledge, measured as change in Shannon entropy, to be below a specified maximal value.Comment: Authentication scheme corrected. Other improvements of presentatio

    Unambiguous State Discrimination of Coherent States with Linear Optics: Application to Quantum Cryptography

    Get PDF
    We discuss several methods for unambiguous state discrimination of N symmetric coherent states using linear optics and photodetectors. One type of measurements is shown to be optimal in the limit of small photon numbers for any N. For the special case of N=4 this measurement can be fruitfully used by the receiving end (Bob) in an implementation of the BB84 quantum key distribution protocol using faint laser pulses. In particular, if Bob detects only a single photon the procedure is equivalent to the standard measurement that he would have to perform in a single-photon implementation of BB84, if he detects two photons Bob will unambiguously know the bit sent to him in 50% of the cases without having to exchange basis information, and if three photons are detected, Bob will know unambiguously which quantum state was sent.Comment: 5 RevTeX pages, 2 eps figure
    corecore