Complete physical simulation of the entangling-probe attack on the Bennett-Brassard 1984 protocol
Reads0
Chats0
TLDR
The most powerful individual-photon attack against the Bennett-Brassard 1984 quantum key distribution protocol is implemented, in good agreement with theoretical predictions for the eavesdropper¿s Rényi information.Abstract:
We have used deterministic single-photon two qubit (SPTQ) quantum logic to implement the most powerful individual-photon attack against the Bennett-Brassard 1984 (BB84) quantum key distribution protocol. Our measurement results, including physical source and gate errors, are in good agreement with theoretical predictions for the Renyi information obtained by Eve as a function of the errors she imparts to Alice and Bob's sifted key bits. The current experiment is a physical simulation of a true attack, because Eve has access to Bob's physical receiver module. This experiment illustrates the utility of an efficient deterministic quantum logic for performing realistic physical simulations of quantum information processing functions.read more
Citations
More filters
Daylight Quantum Key Distribution over 1.6 km
William T. Buttler,Richard J. Hughes,Paul G. Kwiat,Steve K. Lamoreaux,George L. Morgan,Jane E. Nordholt,Charles G. Peterson +6 more
TL;DR: Quantum key distribution has been demonstrated over a point-to-point 1.6-km atmospheric optical path in full daylight, bringing QKD a step closer to surface- to-satellite and other long-distance applications.
Book ChapterDOI
True Random Number Generators
Mario Stipčević,Çetin Kaya Koç +1 more
TL;DR: This chapter discusses several examples where use of a true RNG is critical and shows how it can significantly improve security of cryptographic systems, and discusses industrial and research challenges that prevent widespread use of TRNGs.
Long distance free-space quantum key distribution
TL;DR: In this paper, a satellite-based global quantum key distribution experiment over a real distance of 144 km was performed, where the transmitter and the receiver were situated in 2500 m altitude on the Canary Islands of La Palma and Tenerife, respectively.
Journal ArticleDOI
Single-photon three-qubit quantum logic using spatial light modulators
Kumel H. Kagalwala,Giovanni Di Giuseppe,Giovanni Di Giuseppe,Ayman F. Abouraddy,Bahaa E. A. Saleh +4 more
TL;DR: An experimental demonstration of three-qubit single-photon, linear, deterministic quantum gates that exploit photon polarization and the two-dimensional spatial-parity-symmetry of the transverse single-Photon field are demonstrated.
BookDOI
Bio-Inspired and Nanoscale Integrated Computing
TL;DR: The Bio-Inspired and Nanoscale Integrated Computing as discussed by the authors is a comprehensive review of the latest advances in nanotechnology and biology to computing, with a focus on bio-inspired computing at the nanoscale, bringing to light several new and innovative applications.
References
More filters
Journal ArticleDOI
Simple proof of security of the BB84 quantum key distribution protocol
Peter W. Shor,John Preskill +1 more
TL;DR: It is proved that the 1984 protocol of Bennett and Brassard (BB84) for quantum key distribution is secure, and a key distribution protocol based on entanglement purification is given, which can be proven secure using methods from Lo and Chau's proof of security for a similar protocol.
Journal ArticleDOI
Generalized privacy amplification
TL;DR: This paper provides a general treatment of privacy amplification by public discussion, a concept introduced by Bennett, Brassard, and Robert for a special scenario, and yields results on wiretap and broadcast channels for a considerably strengthened definition of secrecy capacity.
Book ChapterDOI
Experimental quantum cryptography
TL;DR: Initial results from an apparatus and protocol designed to implement quantum public key distribution are described, by which two users exchange a random quantum transmission, consisting of very faint flashes of polarized light, which remains secure against an adversary with unlimited computing power.
Journal ArticleDOI
Limitations on Practical Quantum Cryptography
TL;DR: It is shown that parametric down-conversion offers enhanced performance compared to its weak coherent pulse counterpart and existing experimental schemes (based on weak pulses) currently do not offer unconditional security for the reported distances and signal strength.
Journal ArticleDOI
Unconditional security in quantum cryptography
TL;DR: In this article, basic techniques to prove the unconditional security of quantum crypto graphy are applied to a quantum key distribution protocol proposed by Bennett and Brassard [1984] and considered a practical variation on the protocol in which the channel is noisy and photos may be lost during the transmission.