Results 1  10
of
120
Proof of security of quantum key distribution with twoway classical communications
, 2002
"... ..."
Information and Computation: Classical and Quantum Aspects
 REVIEWS OF MODERN PHYSICS
, 2001
"... Quantum theory has found a new field of applications in the realm of information and computation during the recent years. This paper reviews how quantum physics allows information coding in classically unexpected and subtle nonlocal ways, as well as information processing with an efficiency largely ..."
Abstract

Cited by 24 (2 self)
 Add to MetaCart
Quantum theory has found a new field of applications in the realm of information and computation during the recent years. This paper reviews how quantum physics allows information coding in classically unexpected and subtle nonlocal ways, as well as information processing with an efficiency largely surpassing that of the present and foreseeable classical computers. Some outstanding aspects of classical and quantum information theory will be addressed here. Quantum teleportation, dense coding, and quantum cryptography are discussed as a few samples of the impact of quanta in the transmission of information. Quantum logic gates and quantum algorithms are also discussed as instances of the improvement in information processing by a quantum computer. We provide finally some examples of current experimental
LongDistance Quantum Communication With Entangled Photons Using Satellites
 IEEE J. Sel. Top. Quant. Elec. 9
, 2003
"... Abstract—The use of satellites to distribute entangled photon pairs (and single photons) provides a unique solution for longdistance quantum communication networks. This overcomes the principle limitations of Earthbound technology, i.e., the range of the order of 100 km afforded by both optical fi ..."
Abstract

Cited by 10 (4 self)
 Add to MetaCart
(Show Context)
Abstract—The use of satellites to distribute entangled photon pairs (and single photons) provides a unique solution for longdistance quantum communication networks. This overcomes the principle limitations of Earthbound technology, i.e., the range of the order of 100 km afforded by both optical fiber and by terrestrial freespace links. Index Terms—Quantum communication, quantum entanglement, satellite applications, space technology. I.
Using Quantum Key Distribution within IPSEC to secure MAN communications
 In MAN 2005 conference
, 2005
"... ABSTRACT. Quantum cryptography could be integrated in various existing concepts and protocols to secure Metropolitan Area Networks communications. One of the possible use of quantum cryptography is within IPSEC. The applications of quantum cryptography are linked to telecommunication services that r ..."
Abstract

Cited by 9 (0 self)
 Add to MetaCart
(Show Context)
ABSTRACT. Quantum cryptography could be integrated in various existing concepts and protocols to secure Metropolitan Area Networks communications. One of the possible use of quantum cryptography is within IPSEC. The applications of quantum cryptography are linked to telecommunication services that require very high level of security in Metropolitan Area Networks. The aim of this paper is to analyse the use of quantum cryptography within IPSEC to secure MAN communications and to present the estimated performances of this solution. We analyse classical IPSEC advantage and limits to point out how quantum cryptography could enhance the security level of IPSEC. After having introduced basic concepts in quantum cryptography, we propose a solution that integrate quantum key distribution into IPSEC. A performance analysis is done to demonstrate the operational feasibility of this solution.
Bahraminasab; Quantum Key distribution for dlevel systems with generalized Bell states; quantph/0111091
"... a ∗ b † ..."
(Show Context)
Crossing distribution
 In Proceedings of the European Conference on Design Automation. 354–361
, 1992
"... practically feasible entanglement assisted quantum key ..."
Abstract

Cited by 5 (0 self)
 Add to MetaCart
practically feasible entanglement assisted quantum key
ROBUST CRYPTOGRAPHY IN THE NOISYQUANTUMSTORAGE MODEL
, 2009
"... It was shown in [42] that cryptographic primitives can be implemented based on the assumption that quantum storage of qubits is noisy. In this work we analyze a protocol for the universal task of oblivious transfer that can be implemented using quantumkeydistribution (QKD) hardware in the practica ..."
Abstract

Cited by 4 (2 self)
 Add to MetaCart
It was shown in [42] that cryptographic primitives can be implemented based on the assumption that quantum storage of qubits is noisy. In this work we analyze a protocol for the universal task of oblivious transfer that can be implemented using quantumkeydistribution (QKD) hardware in the practical setting where honest participants are unable to perform noisefree operations. We derive tradeoffs between the amount of storage noise, the amount of noise in the operations performed by the honest participants and the security of oblivious transfer which are greatly improved compared to the results in [42]. As an example, we show that for the case of depolarizing noise in storage we can obtain secure oblivious transfer as long as the quantum biterror rate of the channel does not exceed 11 % and the noise on the channel is strictly less than the quantum storage noise. This is optimal for the protocol considered. Finally, we show that our analysis easily carries over to quantum protocols for secure identification.
Security aspects of the Authentication used in Quantum Cryptography
, 2006
"... Unconditionally secure message authentication is an ..."
Abstract

Cited by 4 (0 self)
 Add to MetaCart
(Show Context)
Unconditionally secure message authentication is an
High Speed FiberBased Quantum Key Distribution using Polarization Encoding
 in Proceedings of SPIE, Volume 5893, Quantum Communications and Quantum Imaging III (Ronald E. Meyers, Yanhua Shih, Editors), 58931A
"... We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The highspeed management of the bitstream, generation of random numbers and processing of the sifting algorithm are all handled by a pair of custom data handling circuit boa ..."
Abstract

Cited by 4 (3 self)
 Add to MetaCart
(Show Context)
We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The highspeed management of the bitstream, generation of random numbers and processing of the sifting algorithm are all handled by a pair of custom data handling circuit boards. As a complete system using a clock rate of 1.25 Gbit/s, it produces sifted keys at a rate of 1.1 Mb/s with an error rate lower than 1.3 % while operating at a transmission rate of 312.5 Mbit/s and a mean photon number µ = 0.1. With a number of proposed improvements this system has a potential for a higher key rate without an elevated error rate.
PhaseRemapping Attack in Practical Quantum Key Distribution Systems
, 2006
"... Abstract — Quantum key distribution (QKD) can be used to generate secret keys between two distant parties. Even though QKD has been proven unconditionally secure against eavesdroppers with unlimited computation power, practical implementations of QKD may contain loopholes that may lead to the genera ..."
Abstract

Cited by 3 (0 self)
 Add to MetaCart
(Show Context)
Abstract — Quantum key distribution (QKD) can be used to generate secret keys between two distant parties. Even though QKD has been proven unconditionally secure against eavesdroppers with unlimited computation power, practical implementations of QKD may contain loopholes that may lead to the generated secret keys being compromised. In this paper, we propose a phase remapping attack targeting two practical bidirectional QKD systems (the “plug & play ” system and the Sagnac system). We show that if the users of the systems are unaware of our attack, the final key shared between them can be compromised in some situations (namely, when QBER> 14.6%). Also, our attack is feasible with only current technology. Therefore, it is very important to be aware of our attack in order to maintain absolute security. In finding our attack, we minimize the QBER over an individual measurement described by a general POVM, which has some similarity with the standard quantum state discrimination problem. However, one interesting difference is that, in our case, the minimum QBER is discontinuous at the point where the phases of all states are the same. I.