首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 234 毫秒
1.
The security of keys for the basic nonrelativistic BB84 protocol has been examined for more than 15 years. A simple proof of security for the case of a single-photon source of quantum states and finite sequences has been only recently obtained using entropy uncertainty relations. However, the existing sources of states are not strictly single-photon. Since sources are not single-photon and losses in a quantum channel??open space??are not a priori known and vary, nonrelativistic quantum cryptographic systems in open space cannot guarantee the unconditional security of keys. Recently proposed relativistic quantum cryptography removes fundamental constraints associated with non-single-photon sources and losses in open space. The resistance of a fundamentally new family of protocols for relativistic quantum key distribution through open space has been analyzed for the real situation with finite lengths of transmitted sequences of quantum states. This system is stable with real sources of non-single-photon states (weakened laser radiation) and arbitrary losses in open space.  相似文献   

2.
S. N. Molotkov 《JETP Letters》2013,97(10):604-610
The security of cryptographic keys in quantum cryptography systems is guaranteed by fundamental quantum mechanical exclusion principles. A quantum channel through which quantum states are transferred is not controlled and an eavesdropper can perform any modifications with it. The security of quantum key distribution protocols has already been proved [M. Tomamichel et al., Nature Commun. 3, 634 (2011); S. N. Molotkov, J. Exp. Theor. Phys. 115, 969 (2012)], including the realistic case of a finite length of transmitted sequences. It is always assumed that the eavesdropper has neither direct nor indirect access to the transmitting and receiving equipment. The real situation is somewhat different. The preparation and detection of quantum states occur according to random sequences that are generated on the transmitter and receiver sides. Detecting electromagnetic radiation generated in these processes, the eavesdropper can obtain additional information on a key. The upper quantum-mechanical bound on the amount of information of the eavesdropper on the key that can be obtained through a side channel has been determined.  相似文献   

3.
The proof of the security of quantum key distribution is a rather complex problem. Security is defined in terms different from the requirements imposed on keys in classical cryptography. In quantum cryptography, the security of keys is expressed in terms of the closeness of the quantum state of an eavesdropper after key distribution to an ideal quantum state that is uncorrelated to the key of legitimate users. A metric of closeness between two quantum states is given by the trace metric. In classical cryptography, the security of keys is understood in terms of, say, the complexity of key search in the presence of side information. In quantum cryptography, side information for the eavesdropper is given by the whole volume of information on keys obtained from both quantum and classical channels. The fact that the mathematical apparatuses used in the proof of key security in classical and quantum cryptography are essentially different leads to misunderstanding and emotional discussions [1]. Therefore, one should be able to answer the question of how different cryptographic robustness criteria are related to each other. In the present study, it is shown that there is a direct relationship between the security criterion in quantum cryptography, which is based on the trace distance determining the distinguishability of quantum states, and the criterion in classical cryptography, which uses guesswork on the determination of a key in the presence of side information.  相似文献   

4.
5.
The article is focused on research of an attack on the quantum key distribution system and proposes a countermeasure method. Particularly noteworthy is that this is not a classic attack on a quantum protocol. We describe an attack on the process of calibration. Results of the research show that quantum key distribution systems have vulnerabilities not only in the protocols, but also in other vital system components. The described type of attack does not affect the cryptographic strength of the received keys and does not point to the vulnerability of the quantum key distribution protocol. We also propose a method for autocompensating optical communication system development, which protects synchronization from unauthorized access. The proposed method is based on the use of sync pulses attenuated to a photon level in the process of detecting a time interval with a signal. The paper presents the results of experimental studies that show the discrepancies between the theoretical and real parameters of the system. The obtained data allow the length of the quantum channel to be calculated with high accuracy.  相似文献   

6.
It has been shown that the coherent quantum cryptography protocol (Coherent One Way) and, correspondingly, fiber optic systems involving this protocol for quantum key distribution, are vulnerable to an attack with repeated measurements and do not guarantee the security of distributed keys in a communication channel with losses. The coherent quantum cryptography system is used in Switzerland as one of the key distribution channels in the framework of the network project SECOQC (SEcure COmmunications based on Quantum Cryptography). A critical attack with repeated measurements was missed when the cryptographic strength of this protocol was analyzed. The critical length of the communication channel has been determined; this is a value above which secure key distribution is certainly impossible. Beginning with the critical length, an eavesdropper knows the entire distributed key, does not introduce errors at the receiver end, and remains undetected. For typical parameters in a real system (the average photon number μ = 0.5 and the quantum efficiency of avalanche detectors η = 0.1, see N. Gisin, G. Ribordy, H. Zbinden, et al., arXiv:quant-ph/0411022 and D. Stucki, C. Barreiro, S. Fasel, et al., arXiv:quant-ph/08095264), the security of keys cannot be guaranteed even for a communication channel whose length is as small as wished.  相似文献   

7.
We propose a new cryptographic protocol. It is suggested to encode information in ordinary binary form into many-qubit entangled states with the help of a quantum computer. A state of qubits (realized, e.g., with photons) is transmitted through a quantum channel to the addressee, who applies a quantum computer tuned to realize the inverse unitary-transformation decoding of the message. Different ways of eavesdropping are considered, and an estimate of the time needed for determining the secret unitary transformation is given. It is shown that using even small quantum computers can serve as a basis for very efficient cryptographic protocols. For a suggested cryptographic protocol, the time scale on which communication can be considered secure is exponential in the number of qubits in the entangled states and in the number of gates used to construct the quantum network.  相似文献   

8.
Happy New Year     
The collective phenomena of quantum interference, including wave particle duality and apparent non-locality, have intrigued the physics community for many years. It is only recently that we have begun to turn these somewhat counter intuitive quantum phenomena to good use. A leading force in that direction is quantum cryptography - absolute secure key exchange encoding data on the polarisation or phase of individual photons, or using the quantum correlations between pairs of particles. Technologies are now implemented to bring the various forms of quantum cryptography to commercial application. At the same time the possibility of communications applications has stimulated the study of a variety of novel quantum interference phenomena. Quantum information experiments involving two, three and four photons are planned and a novel Field of continuous variable (many photon) quantum information has emerged. These various aspects of quantum cryptography are considered in the conference “QUICK: Quan- tum interference and cryptographic keys: novel physics and advancing technologies", taking place in Cargese from April 7 to 13, 2001. Following that conference, we invite submission of original papers to a special issue of the European Physical Journal D, on the following topics: - quantum cryptography technologies, - quantum cryptography systems, - free space quantum cryptography and satellites, - pair-photon sources and multiphoton interference, - single photon sources, - continuous variable quantum information, - security aspects, - cryptographic protocols, - entanglement purification in cryptographic schemes, - novel physics and quantum gates for photonic qubits.  相似文献   

9.
The collective phenomena of quantum interference, including wave particle duality and apparent non-locality, have intrigued the physics community for many years. It is only recently that we have begun to turn these somewhat counter intuitive quantum phenomena to good use. A leading force in that direction is quantum cryptography - absolute secure key exchange encoding data on the polarisation or phase of individual photons, or using the quantum correlations between pairs of particles. Technologies are now implemented to bring the various forms of quantum cryptography to commercial application. At the same time the possibility of communications applications has stimulated the study of a variety of novel quantum interference phenomena. Quantum information experiments involving two, three and four photons are planned and a novel Field of continuous variable (many photon) quantum information has emerged. These various aspects of quantum cryptography are considered in the conference “QUICK: Quan- tum interference and cryptographic keys: novel physics and advancing technologies", taking place in Cargese from April 7 to 13, 2001. Following that conference, we invite submission of original papers to a special issue of the European Physical Journal D, on the following topics: - quantum cryptography technologies, - quantum cryptography systems, - free space quantum cryptography and satellites, - pair-photon sources and multiphoton interference, - single photon sources, - continuous variable quantum information, - security aspects, - cryptographic protocols, - entanglement purification in cryptographic schemes, - novel physics and quantum gates for photonic qubits. The submitted articles should be sent to the EPJ D Editorial Office in Orsay. The deadline is July 15, 2001. We look forward to a stimulating special issue.  相似文献   

10.
Call for papers     
The collective phenomena of quantum interference, including wave particle duality and apparent non-locality, have intrigued the physics community for many years. It is only recently that we have begun to turn these somewhat counter intuitive quantum phenomena to good use. A leading force in that direction is quantum cryptography - absolute secure key exchange encoding data on the polarisation or phase of individual photons, or using the quantum correlations between pairs of particles. Technologies are now implemented to bring the various forms of quantum cryptography to commercial application. At the same time the possibility of communications applications has stimulated the study of a variety of novel quantum interference phenomena. Quantum information experiments involving two, three and four photons are planned and a novel Field of continuous variable (many photon) quantum information has emerged. These various aspects of quantum cryptography are considered in the conference “QUICK: Quan- tum interference and cryptographic keys: novel physics and advancing technologies", taking place in Cargese from April 7 to 13, 2001. Following that conference, we invite submission of original papers to a special issue of the European Physical Journal D, on the following topics: - quantum cryptography technologies, - quantum cryptography systems, - free space quantum cryptography and satellites, - pair-photon sources and multiphoton interference, - single photon sources, - continuous variable quantum information, - security aspects, - cryptographic protocols, - entanglement purification in cryptographic schemes, - novel physics and quantum gates for photonic qubits. The submitted articles should be sent to the EPJ D Editorial Office in Orsay. The deadline is July 15, 2001. We look forward to a stimulating special issue.  相似文献   

11.
胡新广  唐翌 《中国物理 B》2008,17(11):4268-4272
This paper studies the two-vibron bound states in the β- Fermi Pasta-Ulam model by means of the number conserving approximation combined with the number state method. The results indicate that on-site, adjacent-site and mixed two-vibron bound states may exist in the model. Specially, wave number has a significant effect on such bound states, which may be considered as the quantum effects of the localized states in quantum systems.  相似文献   

12.
    
The collective phenomena of quantum interference, including wave particle duality and apparent non-locality, have intrigued the physics community for many years. It is only recently that we have begun to turn these somewhat counter intuitive quantum phenomena to good use. A leading force in that direction is quantum cryptography - absolute secure key exchange encoding data on the polarisation or phase of individual photons, or using the quantum correlations between pairs of particles. Technologies are now implemented to bring the various forms of quantum cryptography to commercial application. At the same time the possibility of communications applications has stimulated the study of a variety of novel quantum interference phenomena. Quantum information experiments involving two, three and four photons are planned and a novel Field of continuous variable (many photon) quantum information has emerged. These various aspects of quantum cryptography are considered in the conference “QUICK: Quan- tum interference and cryptographic keys: novel physics and advancing technologies", taking place in Cargese from April 7 to 13, 2001. Following that conference, we invite submission of original papers to a special issue of the European Physical Journal D, on the following topics: - quantum cryptography technologies, - quantum cryptography systems, - free space quantum cryptography and satellites, - pair-photon sources and multiphoton interference, - single photon sources, - continuous variable quantum information, - security aspects, - cryptographic protocols, - entanglement purification in cryptographic schemes, - novel physics and quantum gates for photonic qubits. The submitted articles should be sent to the EPJ D Editorial Office in Orsay. The deadline is July 15, 2001. We look forward to a stimulating special issue.  相似文献   

13.
The collective phenomena of quantum interference, including wave particle duality and apparent non-locality, have intrigued the physics community for many years. It is only recently that we have begun to turn these somewhat counter intuitive quantum phenomena to good use. A leading force in that direction is quantum cryptography - absolute secure key exchange encoding data on the polarisation or phase of individual photons, or using the quantum correlations between pairs of particles. Technologies are now implemented to bring the various forms of quantum cryptography to commercial application. At the same time the possibility of communications applications has stimulated the study of a variety of novel quantum interference phenomena. Quantum information experiments involving two, three and four photons are planned and a novel Field of continuous variable (many photon) quantum information has emerged. These various aspects of quantum cryptography are considered in the conference “QUICK: Quan- tum interference and cryptographic keys: novel physics and advancing technologies", taking place in Cargese from April 7 to 13, 2001. Following that conference, we invite submission of original papers to a special issue of the European Physical Journal D, on the following topics: - quantum cryptography technologies, - quantum cryptography systems, - free space quantum cryptography and satellites, - pair-photon sources and multiphoton interference, - single photon sources, - continuous variable quantum information, - security aspects, - cryptographic protocols, - entanglement purification in cryptographic schemes, - novel physics and quantum gates for photonic qubits. The submitted articles should be sent to the EPJ D Editorial Office in Orsay. The deadline is July 15, 2001. We look forward to a stimulating special issue.  相似文献   

14.
    
The collective phenomena of quantum interference, including wave particle duality and apparent non-locality, have intrigued the physics community for many years. It is only recently that we have begun to turn these somewhat counter intuitive quantum phenomena to good use. A leading force in that direction is quantum cryptography - absolute secure key exchange encoding data on the polarisation or phase of individual photons, or using the quantum correlations between pairs of particles. Technologies are now implemented to bring the various forms of quantum cryptography to commercial application. At the same time the possibility of communications applications has stimulated the study of a variety of novel quantum interference phenomena. Quantum information experiments involving two, three and four photons are planned and a novel Field of continuous variable (many photon) quantum information has emerged. These various aspects of quantum cryptography are considered in the conference “QUICK: Quan- tum interference and cryptographic keys: novel physics and advancing technologies", taking place in Cargese from April 7 to 13, 2001. Following that conference, we invite submission of original papers to a special issue of the European Physical Journal D, on the following topics: - quantum cryptography technologies, - quantum cryptography systems, - free space quantum cryptography and satellites, - pair-photon sources and multiphoton interference, - single photon sources, - continuous variable quantum information, - security aspects, - cryptographic protocols, - entanglement purification in cryptographic schemes, - novel physics and quantum gates for photonic qubits. The submitted articles should be sent to the EPJ D Editorial Office in Orsay. The deadline is July 15, 2001. We look forward to a stimulating special issue.  相似文献   

15.
The quantum phase properties of the generalized squeezed vacuum states associated with solvable quantum systems are studied by using the Pegg-Barnett formalism.Then,two nonclassical features,i.e.,squeezing in the number and phase operators,as well as the number-phase Wigner function of the generalized squeezed states are investigated.Due to some actual physical situations,the present approach is applied to two classes of generalized squeezed states:solvable quantum systems with discrete spectra and nonlinear squeezed states with particular nonlinear functions.Finally,the time evolution of the nonclassical properties of the considered systems has been numerically investigated.  相似文献   

16.
S. N. Molotkov 《JETP Letters》2017,105(12):801-805
The security of quantum cryptography protocols after a quantum key distribution (QKD) session is formulated in terms of proximity between two situations: quantum states corresponding to real and ideal situations after QKD. The measure of proximity is the trace distance. It is more reasonable to formulate security directly in terms of the smallness of probability of successive guessing of keys by an eavesdropper after an arbitrary number of QKD sessions. There is a fundamental question the answer to which is a priori very unobvious: Is the security criterion in terms of the proximity of the real and ideal situations for a single QKD session sufficient to guarantee the security of keys in terms of the smallness of probability of guessing of keys by the eavesdropper after an arbitrary number of QKD sessions? It has been shown that the answer to this question is positive.  相似文献   

17.
Photon number states are assigned a parity of +1 if their photon number is even and a parity of ?1 if odd. The parity operator, which is minus one to the power of the photon number operator, is a Hermitian operator and thus a quantum mechanical observable although it has no classical analogue, the concept being meaningless in the context of classical light waves. In this paper we review work on the application of the parity operator to the problem of quantum metrology for the detection of small phase shifts with quantum optical interferometry using highly entangled field states such as the so-called N00N states, and states obtained by injecting twin Fock states into a beam splitter. With such states and with the performance of parity measurements on one of the output beams of the interferometer, one can breach the standard quantum limit, or shot-noise limit, of sensitivity down to the Heisenberg limit, the greatest degree of phase sensitivity allowed by quantum mechanics for linear phase shifts. Heisenberg limit sensitivities are expected to eventually play an important role in attempts to detect gravitational waves in interferometric detection systems such as LIGO and VIRGO.  相似文献   

18.
A distributed balancing method for single-pass quantum cryptographic systems with phase encoding has been proposed. This method allows completely automated balancing, is quite universal, and can be used in other optical experiments.  相似文献   

19.
Recently, various encryption techniques based on chaos have been proposed. However, most existing chaotic encryption schemes still suffer from fundamental problems such as small key space, weak security function and slow performance speed. This paper introduces an efficient encryption scheme for still visual data that overcome these disadvantages. The proposed scheme is based on hybrid Linear Feedback Shift Register (LFSR) and chaotic systems in hybrid domains. The core idea is to scramble the pixel positions based on 2D chaotic systems in frequency domain. Then, the diffusion is done on the scrambled image based on cryptographic primitive operations and the incorporation of LFSR and chaotic systems as round keys. The hybrid compound of LFSR, chaotic system and cryptographic primitive operations strengthen the encryption performance and enlarge the key space required to resist the brute force attacks. Results of statistical and differential analysis show that the proposed algorithm has high security for secure digital images. Furthermore, it has key sensitivity together with a large key space and is very fast compared to other competitive algorithms.  相似文献   

20.
We show that the one-way channel formalism of quantum optics has a physical realization in electronic systems. In particular, we show that magnetic edge states form unidirectional quantum channels capable of coherently transporting electronic quantum information. Using the equivalence between one-way photonic channels and magnetic edge states, we adapt a proposal for quantum state transfer to mesoscopic systems using edge states as a quantum channel, and show that it is feasible with reasonable experimental parameters. We discuss how this protocol may be used to transfer information encoded in number, charge, or spin states of quantum dots, so it may prove useful for transferring quantum information between parts of a solid-state quantum computer.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号