schliessen

Filtern

 

Bibliotheken

Security of counterfactual quantum cryptography

Recently, a 'counterfactual' quantum-key-distribution scheme was proposed by T.-G. Noh [Phys. Rev. Lett. 103, 230501 (2009)]. In this scheme, two legitimate distant peers may share secret keys even when the information carriers are not traveled in the quantum channel. We find that this protocol is e... Full description

Journal Title: Physical Review A 10/2010, Vol.82(4)
Main Author: Yin, Zhen-Qiang
Other Authors: Li, Hong-Wei , Chen, Wei , Han, Zheng-Fu , Guo, Guang-Can
Format: Electronic Article Electronic Article
Language: English
Subjects:
ID: ISSN: 1050-2947 ; E-ISSN: 1094-1622 ; DOI: http://dx.doi.org/10.1103/PhysRevA.82.042335
Zum Text:
SendSend as email Add to Book BagAdd to Book Bag
Staff View
recordid: crossref10.1103/PhysRevA.82.042335
title: Security of counterfactual quantum cryptography
format: Article
creator:
  • Yin, Zhen-Qiang
  • Li, Hong-Wei
  • Chen, Wei
  • Han, Zheng-Fu
  • Guo, Guang-Can
subjects:
  • Classical And Quantum Mechanics, General Physicsasymptotic Solutions
  • Distribution
  • Errors
  • Photons
  • Quantum Cryptography
  • Quantum Entanglement
  • Quantum Mechanics
  • Quantum States
  • Security
  • Bosons
  • Cryptography
  • Elementary Particles
  • Massless Particles
  • Mathematical Solutions
  • Mechanics
ispartof: Physical Review A, 10/2010, Vol.82(4)
description: Recently, a 'counterfactual' quantum-key-distribution scheme was proposed by T.-G. Noh [Phys. Rev. Lett. 103, 230501 (2009)]. In this scheme, two legitimate distant peers may share secret keys even when the information carriers are not traveled in the quantum channel. We find that this protocol is equivalent to an entanglement distillation protocol. According to this equivalence, a strict security proof and the asymptotic key bit rate are both obtained when a perfect single-photon source is applied and a Trojan horse attack can be detected. We also find that the security of this scheme is strongly related to not only the bit error rate but also the yields of photons. And our security proof may shed light on the security of other two-way protocols. Journal Article.
language: eng
source:
identifier: ISSN: 1050-2947 ; E-ISSN: 1094-1622 ; DOI: http://dx.doi.org/10.1103/PhysRevA.82.042335
fulltext: fulltext
issn:
  • 10502947
  • 1050-2947
  • 10941622
  • 1094-1622
url: Link


@attributes
ID870651012
RANK0.07
NO1
SEARCH_ENGINEprimo_central_multiple_fe
SEARCH_ENGINE_TYPEPrimo Central Search Engine
LOCALfalse
PrimoNMBib
record
control
sourcerecordid10.1103/PhysRevA.82.042335
sourceidcrossref
recordidTN_crossref10.1103/PhysRevA.82.042335
sourceformatXML
sourcesystemPC
pqid2087125288
display
typearticle
titleSecurity of counterfactual quantum cryptography
creatorYin, Zhen-Qiang ; Li, Hong-Wei ; Chen, Wei ; Han, Zheng-Fu ; Guo, Guang-Can
ispartofPhysical Review A, 10/2010, Vol.82(4)
identifier
languageeng
source
lds41201010
subjectClassical And Quantum Mechanics, General Physicsasymptotic Solutions ; Distribution ; Errors ; Photons ; Quantum Cryptography ; Quantum Entanglement ; Quantum Mechanics ; Quantum States ; Security ; Bosons ; Cryptography ; Elementary Particles ; Massless Particles ; Mathematical Solutions ; Mechanics;
descriptionRecently, a 'counterfactual' quantum-key-distribution scheme was proposed by T.-G. Noh [Phys. Rev. Lett. 103, 230501 (2009)]. In this scheme, two legitimate distant peers may share secret keys even when the information carriers are not traveled in the quantum channel. We find that this protocol is equivalent to an entanglement distillation protocol. According to this equivalence, a strict security proof and the asymptotic key bit rate are both obtained when a perfect single-photon source is applied and a Trojan horse attack can be detected. We also find that the security of this scheme is strongly related to not only the bit error rate but also the yields of photons. And our security proof may shed light on the security of other two-way protocols. Journal Article.
version4
lds50peer_reviewed
links
openurl$$Topenurl_article
thumbnail
0$$TPCamazon_thumb
1$$TPCgoogle_thumb
openurlfulltext$$Topenurlfull_article
addlink$$Uhttp://exlibris-pub.s3.amazonaws.com/aboutCrossref.html$$EView_CrossRef_copyright_notice
search
creatorcontrib
0Yin, Zhen-Qiang
1Li, Hong-Wei
2Chen, Wei
3Han, Zheng-Fu
4Guo, Guang-Can
titleSecurity of counterfactual quantum cryptography
general
0English
110.1103/PhysRevA.82.042335
2American Physical Society (APS) (via CrossRef)
3American Physical Society (APS) (CrossRef)
sourceidcrossref
recordidcrossref10.1103/PhysRevA.82.042335
issn
010502947
11050-2947
210941622
31094-1622
rsrctypearticle
addtitle
0Physical Review A
1Phys. Rev. A
searchscope
0crossref_aps
1CrossRef
2Crossref
3crossref
scope
0crossref_aps
1CrossRef
2Crossref
3crossref
lsr40201010
lsr41201010
lsr442010
lsr4520101027
tmp012
tmp022
creationdate2010
startdate20101001
enddate20101031
citationvol 82 issue 4
lsr30VSR-Enriched:[subject, pqid, description]
sort
titleSecurity of counterfactual quantum cryptography
authorYin, Zhen-Qiang ; Li, Hong-Wei ; Chen, Wei ; Han, Zheng-Fu ; Guo, Guang-Can
creationdate20101000
lso0120101000
facets
frbrgroupid9013467947444619804
frbrtype5
languageeng
creationdate2010
collectionAmerican Physical Society (APS) (CrossRef)
prefilterarticles
rsrctypearticles
creatorcontrib
0Yin, Zhen-Qiang
1Li, Hong-Wei
2Chen, Wei
3Han, Zheng-Fu
4Guo, Guang-Can
jtitlePhysical Review A
toplevelpeer_reviewed
delivery
delcategoryRemote Search Resource
fulltextfulltext
addata
aulast
0Yin
1Li
2Chen
3Han
4Guo
aufirst
0Zhen-Qiang
1Hong-Wei
2Wei
3Zheng-Fu
4Guang-Can
au
0Yin, Zhen-Qiang
1Li, Hong-Wei
2Chen, Wei
3Han, Zheng-Fu
4Guo, Guang-Can
atitleSecurity of counterfactual quantum cryptography
jtitlePhysical Review A
stitlePhys. Rev. A
risdate201010
adddate
0201010
12010
220101027
volume82
issue4
issn1050-2947
eissn1094-1622
formatjournal
genrearticle
ristypeJOUR
doi10.1103/PhysRevA.82.042335
lad012
date2010-10