106 research outputs found

    Quantum coin tossing and bit-string generation in the presence of noise

    Full text link
    We discuss the security implications of noise for quantum coin tossing protocols. We find that if quantum error correction can be used, so that noise levels can be made arbitrarily small, then reasonable security conditions for coin tossing can be framed so that results from the noiseless case will continue to hold. If, however, error correction is not available (as is the case with present day technology), and significant noise is present, then tossing a single coin becomes problematic. In this case, we are led to consider random n-bit string generation in the presence of noise, rather than single-shot coin tossing. We introduce precise security criteria for n-bit string generation and describe an explicit protocol that could be implemented with present day technology. In general, a cheater can exploit noise in order to bias coins to their advantage. We derive explicit upper bounds on the average bias achievable by a cheater for given noise levels.Comment: REVTeX. 6 pages, no figures. Early versions contained errors in statements of security conditions, although results were correct. v4: PRA versio

    Quantum Gambling Using Three Nonorthogonal States

    Full text link
    We provide a quantum gambling protocol using three (symmetric) nonorthogonal states. The bias of the proposed protocol is less than that of previous ones, making it more practical. We show that the proposed scheme is secure against non-entanglement attacks. The security of the proposed scheme against entanglement attacks is shown heuristically.Comment: no essential correction, 4 pages, RevTe

    Quantum games of asymmetric information

    Full text link
    We investigate quantum games in which the information is asymmetrically distributed among the players, and find the possibility of the quantum game outperforming its classical counterpart depends strongly on not only the entanglement, but also the informational asymmetry. What is more interesting, when the information distribution is asymmetric, the contradictive impact of the quantum entanglement on the profits is observed, which is not reported in quantum games of symmetric information.Comment: 5 pages, 3 figure

    Shor-Preskill Type Security-Proofs for Concatenated Bennett-Brassard 1984 Quantum Key Distribution Protocol

    Full text link
    We discuss long code problems in the Bennett-Brassard 1984 (BB84) quantum key distribution protocol and describe how they can be overcome by concatenation of the protocol. Observing that concatenated modified Lo-Chau protocol finally reduces to the concatenated BB84 protocol, we give the unconditional security of the concatenated BB84 protocol.Comment: 4 pages, RevTe

    The Case for Quantum Key Distribution

    Get PDF
    Quantum key distribution (QKD) promises secure key agreement by using quantum mechanical systems. We argue that QKD will be an important part of future cryptographic infrastructures. It can provide long-term confidentiality for encrypted information without reliance on computational assumptions. Although QKD still requires authentication to prevent man-in-the-middle attacks, it can make use of either information-theoretically secure symmetric key authentication or computationally secure public key authentication: even when using public key authentication, we argue that QKD still offers stronger security than classical key agreement.Comment: 12 pages, 1 figure; to appear in proceedings of QuantumComm 2009 Workshop on Quantum and Classical Information Security; version 2 minor content revision

    Controlled order rearrangement encryption for quantum key distribution

    Full text link
    A novel technique is devised to perform orthogonal state quantum key distribution. In this scheme, entangled parts of a quantum information carrier are sent from Alice to Bob through two quantum channels. However before the transmission, the orders of the quantum information carrier in one channel is reordered so that Eve can not steal useful information. At the receiver's end, the order of the quantum information carrier is restored. The order rearrangement operation in both parties is controlled by a prior shared control key which is used repeatedly in a quantum key distribution session.Comment: 5 pages and 2 figure

    Intrasubband and Intersubband Electron Relaxation in Semiconductor Quantum Wire Structures

    Full text link
    We calculate the intersubband and intrasubband many-body inelastic Coulomb scattering rates due to electron-electron interaction in two-subband semiconductor quantum wire structures. We analyze our relaxation rates in terms of contributions from inter- and intrasubband charge-density excitations separately. We show that the intersubband (intrasubband) charge-density excitations are primarily responsible for intersubband (intrasubband) inelastic scattering. We identify the contributions to the inelastic scattering rate coming from the emission of the single-particle and the collective excitations individually. We obtain the lifetime of hot electrons injected in each subband as a function of the total charge density in the wire.Comment: Submitted to PRB. 20 pages, Latex file, and 7 postscript files with Figure

    Giant Shapiro steps for two-dimensional Josephson-junction arrays with time-dependent Ginzburg-Landau dynamics

    Full text link
    Two-dimensional Josephson junction arrays at zero temperature are investigated numerically within the resistively shunted junction (RSJ) model and the time-dependent Ginzburg-Landau (TDGL) model with global conservation of current implemented through the fluctuating twist boundary condition (FTBC). Fractional giant Shapiro steps are found for {\em both} the RSJ and TDGL cases. This implies that the local current conservation, on which the RSJ model is based, can be relaxed to the TDGL dynamics with only global current conservation, without changing the sequence of Shapiro steps. However, when the maximum widths of the steps are compared for the two models some qualitative differences are found at higher frequencies. The critical current is also calculated and comparisons with earlier results are made. It is found that the FTBC is a more adequate boundary condition than the conventional uniform current injection method because it minimizes the influence of the boundary.Comment: 6 pages including 4 figures in two columns, final versio

    A Two-Step Quantum Direct Communication Protocol Using Einstein-Podolsky-Rosen Pair Block

    Full text link
    A protocol for quantum secure direct communication using blocks of EPR pairs is proposed. A set of ordered NN EPR pairs is used as a data block for sending secret message directly. The ordered NN EPR set is divided into two particle sequences, a checking sequence and a message-coding sequence. After transmitting the checking sequence, the two parties of communication check eavesdropping by measuring a fraction of particles randomly chosen, with random choice of two sets of measuring bases. After insuring the security of the quantum channel, the sender, Alice encodes the secret message directly on the message-coding sequence and send them to Bob. By combining the checking and message-coding sequences together, Bob is able to read out the encoded messages directly. The scheme is secure because an eavesdropper cannot get both sequences simultaneously. We also discuss issues in a noisy channel.Comment: 8 pages and 2 figures. To appear in Phys Rev
    corecore