scispace - formally typeset
Open AccessJournal ArticleDOI

Complete physical simulation of the entangling-probe attack on the Bennett-Brassard 1984 protocol

Reads0
Chats0
TLDR
The most powerful individual-photon attack against the Bennett-Brassard 1984 quantum key distribution protocol is implemented, in good agreement with theoretical predictions for the eavesdropper¿s Rényi information.
Abstract
We have used deterministic single-photon two qubit (SPTQ) quantum logic to implement the most powerful individual-photon attack against the Bennett-Brassard 1984 (BB84) quantum key distribution protocol. Our measurement results, including physical source and gate errors, are in good agreement with theoretical predictions for the Renyi information obtained by Eve as a function of the errors she imparts to Alice and Bob's sifted key bits. The current experiment is a physical simulation of a true attack, because Eve has access to Bob's physical receiver module. This experiment illustrates the utility of an efficient deterministic quantum logic for performing realistic physical simulations of quantum information processing functions.

read more

Citations
More filters

Daylight Quantum Key Distribution over 1.6 km

TL;DR: Quantum key distribution has been demonstrated over a point-to-point 1.6-km atmospheric optical path in full daylight, bringing QKD a step closer to surface- to-satellite and other long-distance applications.
Book ChapterDOI

True Random Number Generators

TL;DR: This chapter discusses several examples where use of a true RNG is critical and shows how it can significantly improve security of cryptographic systems, and discusses industrial and research challenges that prevent widespread use of TRNGs.

Long distance free-space quantum key distribution

TL;DR: In this paper, a satellite-based global quantum key distribution experiment over a real distance of 144 km was performed, where the transmitter and the receiver were situated in 2500 m altitude on the Canary Islands of La Palma and Tenerife, respectively.
Journal ArticleDOI

Single-photon three-qubit quantum logic using spatial light modulators

TL;DR: An experimental demonstration of three-qubit single-photon, linear, deterministic quantum gates that exploit photon polarization and the two-dimensional spatial-parity-symmetry of the transverse single-Photon field are demonstrated.
BookDOI

Bio-Inspired and Nanoscale Integrated Computing

TL;DR: The Bio-Inspired and Nanoscale Integrated Computing as discussed by the authors is a comprehensive review of the latest advances in nanotechnology and biology to computing, with a focus on bio-inspired computing at the nanoscale, bringing to light several new and innovative applications.
References
More filters
Journal ArticleDOI

Simple proof of security of the BB84 quantum key distribution protocol

TL;DR: It is proved that the 1984 protocol of Bennett and Brassard (BB84) for quantum key distribution is secure, and a key distribution protocol based on entanglement purification is given, which can be proven secure using methods from Lo and Chau's proof of security for a similar protocol.
Journal ArticleDOI

Generalized privacy amplification

TL;DR: This paper provides a general treatment of privacy amplification by public discussion, a concept introduced by Bennett, Brassard, and Robert for a special scenario, and yields results on wiretap and broadcast channels for a considerably strengthened definition of secrecy capacity.
Book ChapterDOI

Experimental quantum cryptography

TL;DR: Initial results from an apparatus and protocol designed to implement quantum public key distribution are described, by which two users exchange a random quantum transmission, consisting of very faint flashes of polarized light, which remains secure against an adversary with unlimited computing power.
Journal ArticleDOI

Limitations on Practical Quantum Cryptography

TL;DR: It is shown that parametric down-conversion offers enhanced performance compared to its weak coherent pulse counterpart and existing experimental schemes (based on weak pulses) currently do not offer unconditional security for the reported distances and signal strength.
Journal ArticleDOI

Unconditional security in quantum cryptography

TL;DR: In this article, basic techniques to prove the unconditional security of quantum crypto graphy are applied to a quantum key distribution protocol proposed by Bennett and Brassard [1984] and considered a practical variation on the protocol in which the channel is noisy and photos may be lost during the transmission.