9,663 research outputs found
How to Build Unconditionally Secure Quantum Bit Commitment Protocols
The ``impossibility proof'' on unconditionally secure quantum bit commitment
is critically analyzed. Many possibilities for obtaining a secure bit
commitment protocol are indicated, purely on the basis of two-way quantum
communications, which are not covered by the impossibility proof formulation.
They are classified under six new types of protocols, with security proofs for
specific examples on four types. Reasons for some previously failed attempts at
obtaining secure protocols are also indicated.Comment: 10 pages, revtex4; significant changes (see footnote
Some Physics And System Issues In The Security Analysis Of Quantum Key Distribution Protocols
In this paper we review a number of issues on the security of quantum key
distribution (QKD) protocols that bear directly on the relevant physics or
mathematical representation of the QKD cryptosystem. It is shown that the
cryptosystem representation itself may miss out many possible attacks which are
not accounted for in the security analysis and proofs. Hence the final security
claims drawn from such analysis are not reliable, apart from foundational
issues about the security criteria that are discussed elsewhere. The cases of
continuous-variable QKD and multi-photon sources are elaborated upon
- …
