106 research outputs found
Quantum coin tossing and bit-string generation in the presence of noise
We discuss the security implications of noise for quantum coin tossing
protocols. We find that if quantum error correction can be used, so that noise
levels can be made arbitrarily small, then reasonable security conditions for
coin tossing can be framed so that results from the noiseless case will
continue to hold. If, however, error correction is not available (as is the
case with present day technology), and significant noise is present, then
tossing a single coin becomes problematic. In this case, we are led to consider
random n-bit string generation in the presence of noise, rather than
single-shot coin tossing. We introduce precise security criteria for n-bit
string generation and describe an explicit protocol that could be implemented
with present day technology. In general, a cheater can exploit noise in order
to bias coins to their advantage. We derive explicit upper bounds on the
average bias achievable by a cheater for given noise levels.Comment: REVTeX. 6 pages, no figures. Early versions contained errors in
statements of security conditions, although results were correct. v4: PRA
versio
Quantum Gambling Using Three Nonorthogonal States
We provide a quantum gambling protocol using three (symmetric) nonorthogonal
states. The bias of the proposed protocol is less than that of previous ones,
making it more practical. We show that the proposed scheme is secure against
non-entanglement attacks. The security of the proposed scheme against
entanglement attacks is shown heuristically.Comment: no essential correction, 4 pages, RevTe
Quantum games of asymmetric information
We investigate quantum games in which the information is asymmetrically
distributed among the players, and find the possibility of the quantum game
outperforming its classical counterpart depends strongly on not only the
entanglement, but also the informational asymmetry. What is more interesting,
when the information distribution is asymmetric, the contradictive impact of
the quantum entanglement on the profits is observed, which is not reported in
quantum games of symmetric information.Comment: 5 pages, 3 figure
Shor-Preskill Type Security-Proofs for Concatenated Bennett-Brassard 1984 Quantum Key Distribution Protocol
We discuss long code problems in the Bennett-Brassard 1984 (BB84) quantum key
distribution protocol and describe how they can be overcome by concatenation of
the protocol. Observing that concatenated modified Lo-Chau protocol finally
reduces to the concatenated BB84 protocol, we give the unconditional security
of the concatenated BB84 protocol.Comment: 4 pages, RevTe
The Case for Quantum Key Distribution
Quantum key distribution (QKD) promises secure key agreement by using quantum
mechanical systems. We argue that QKD will be an important part of future
cryptographic infrastructures. It can provide long-term confidentiality for
encrypted information without reliance on computational assumptions. Although
QKD still requires authentication to prevent man-in-the-middle attacks, it can
make use of either information-theoretically secure symmetric key
authentication or computationally secure public key authentication: even when
using public key authentication, we argue that QKD still offers stronger
security than classical key agreement.Comment: 12 pages, 1 figure; to appear in proceedings of QuantumComm 2009
Workshop on Quantum and Classical Information Security; version 2 minor
content revision
Controlled order rearrangement encryption for quantum key distribution
A novel technique is devised to perform orthogonal state quantum key
distribution. In this scheme, entangled parts of a quantum information carrier
are sent from Alice to Bob through two quantum channels. However before the
transmission, the orders of the quantum information carrier in one channel is
reordered so that Eve can not steal useful information. At the receiver's end,
the order of the quantum information carrier is restored. The order
rearrangement operation in both parties is controlled by a prior shared control
key which is used repeatedly in a quantum key distribution session.Comment: 5 pages and 2 figure
Intrasubband and Intersubband Electron Relaxation in Semiconductor Quantum Wire Structures
We calculate the intersubband and intrasubband many-body inelastic Coulomb
scattering rates due to electron-electron interaction in two-subband
semiconductor quantum wire structures. We analyze our relaxation rates in terms
of contributions from inter- and intrasubband charge-density excitations
separately. We show that the intersubband (intrasubband) charge-density
excitations are primarily responsible for intersubband (intrasubband) inelastic
scattering. We identify the contributions to the inelastic scattering rate
coming from the emission of the single-particle and the collective excitations
individually. We obtain the lifetime of hot electrons injected in each subband
as a function of the total charge density in the wire.Comment: Submitted to PRB. 20 pages, Latex file, and 7 postscript files with
Figure
Giant Shapiro steps for two-dimensional Josephson-junction arrays with time-dependent Ginzburg-Landau dynamics
Two-dimensional Josephson junction arrays at zero temperature are
investigated numerically within the resistively shunted junction (RSJ) model
and the time-dependent Ginzburg-Landau (TDGL) model with global conservation of
current implemented through the fluctuating twist boundary condition (FTBC).
Fractional giant Shapiro steps are found for {\em both} the RSJ and TDGL cases.
This implies that the local current conservation, on which the RSJ model is
based, can be relaxed to the TDGL dynamics with only global current
conservation, without changing the sequence of Shapiro steps. However, when the
maximum widths of the steps are compared for the two models some qualitative
differences are found at higher frequencies. The critical current is also
calculated and comparisons with earlier results are made. It is found that the
FTBC is a more adequate boundary condition than the conventional uniform
current injection method because it minimizes the influence of the boundary.Comment: 6 pages including 4 figures in two columns, final versio
A Two-Step Quantum Direct Communication Protocol Using Einstein-Podolsky-Rosen Pair Block
A protocol for quantum secure direct communication using blocks of EPR pairs
is proposed. A set of ordered EPR pairs is used as a data block for sending
secret message directly. The ordered EPR set is divided into two particle
sequences, a checking sequence and a message-coding sequence. After
transmitting the checking sequence, the two parties of communication check
eavesdropping by measuring a fraction of particles randomly chosen, with random
choice of two sets of measuring bases. After insuring the security of the
quantum channel, the sender, Alice encodes the secret message directly on the
message-coding sequence and send them to Bob. By combining the checking and
message-coding sequences together, Bob is able to read out the encoded messages
directly. The scheme is secure because an eavesdropper cannot get both
sequences simultaneously. We also discuss issues in a noisy channel.Comment: 8 pages and 2 figures. To appear in Phys Rev
- …