1,415 research outputs found
Quantum Cloning, Eavesdropping and Bell's inequality
We analyze various eavesdropping strategies on a quantum cryptographic
channel. We present the optimal strategy for an eavesdropper restricted to a
two-dimensional probe, interacting on-line with each transmitted signal. The
link between safety of the transmission and the violation of Bell's inequality
is discussed. We also use a quantum copying machine for eavesdropping and for
broadcasting quantum information.Comment: LaTex, 13 pages, with 6 Postscript figure
Nonlinear quantum state transformation of spin-1/2
A non-linear quantum state transformation is presented. The transformation,
which operates on pairs of spin-1/2, can be used to distinguish optimally
between two non-orthogonal states. Similar transformations applied locally on
each component of an entangled pair of spin-1/2 can be used to transform a
mixed nonlocal state into a quasi-pure maximally entangled singlet state. In
both cases the transformation makes use of the basic building block of the
quantum computer, namely the quantum-XOR gate.Comment: 12 pages, LaTeX, amssym, epsfig (2 figures included
Unambiguous state discrimination in quantum cryptography with weak coherent states
The use of linearly independent signal states in realistic implementations of
quantum key distribution (QKD) enables an eavesdropper to perform unambiguous
state discrimination. We explore quantitatively the limits for secure QKD
imposed by this fact taking into account that the receiver can monitor to some
extend the photon number statistics of the signals even with todays standard
detection schemes. We compare our attack to the beamsplitting attack and show
that security against beamsplitting attack does not necessarily imply security
against the attack considered here.Comment: 10 pages, 6 figures, updated version with added discussion of
beamsplitting attac
Security of quantum cryptography using balanced homodyne detection
In this paper we investigate the security of a quantum cryptographic scheme
which utilizes balanced homodyne detection and weak coherent pulse (WCP). The
performance of the system is mainly characterized by the intensity of the WCP
and postselected threshold. Two of the simplest intercept/resend eavesdropping
attacks are analyzed. The secure key gain for a given loss is also discussed in
terms of the pulse intensity and threshold.Comment: RevTeX4, 8pages, 7 figure
Coherent pulse implementations of quantum cryptography protocols resistant to photon number splitting attacks
A new class of quantum cryptography (QC) protocols that are robust against
the most general photon number splitting attacks in a weak coherent pulse
implementation has been recently proposed. In this article we give a quite
exhaustive analysis of several eavesdropping attacks on these schemes. The
eavesdropper (Eve) is supposed to have unlimited technological power while the
honest parties (Alice and Bob) use present day technology, in particular an
attenuated laser as an approximation of a single-photon source. They exploit
the nonorthogonality of quantum states for decreasing the information
accessible to Eve in the multi-photon pulses accidentally produced by the
imperfect source. An implementation of some of these protocols using present
day technology allow for a secure key distribution up to distances of
150 km. We also show that strong-pulse implementations, where a strong pulse is
included as a reference, allow for key distribution robust against photon
number splitting attacks.Comment: 16 pages, 11 figure
Estimates for practical quantum cryptography
In this article I present a protocol for quantum cryptography which is secure
against attacks on individual signals. It is based on the Bennett-Brassard
protocol of 1984 (BB84). The security proof is complete as far as the use of
single photons as signal states is concerned. Emphasis is given to the
practicability of the resulting protocol. For each run of the quantum key
distribution the security statement gives the probability of a successful key
generation and the probability for an eavesdropper's knowledge, measured as
change in Shannon entropy, to be below a specified maximal value.Comment: Authentication scheme corrected. Other improvements of presentatio
Unambiguous State Discrimination of Coherent States with Linear Optics: Application to Quantum Cryptography
We discuss several methods for unambiguous state discrimination of N
symmetric coherent states using linear optics and photodetectors. One type of
measurements is shown to be optimal in the limit of small photon numbers for
any N. For the special case of N=4 this measurement can be fruitfully used by
the receiving end (Bob) in an implementation of the BB84 quantum key
distribution protocol using faint laser pulses. In particular, if Bob detects
only a single photon the procedure is equivalent to the standard measurement
that he would have to perform in a single-photon implementation of BB84, if he
detects two photons Bob will unambiguously know the bit sent to him in 50% of
the cases without having to exchange basis information, and if three photons
are detected, Bob will know unambiguously which quantum state was sent.Comment: 5 RevTeX pages, 2 eps figure
- …