scispace - formally typeset
Search or ask a question
Journal ArticleDOI

Quantum key distribution via quantum encryption

28 Jun 2001-Physical Review A (American Physical Society)-Vol. 64, Iss: 2, pp 024302
TL;DR: A quantum key distribution protocol based on quantum encryption is presented in this Brief Report, where the previously shared Einstein-Podolsky-Rosen pairs act as the quantum key to encode and decode the classical cryptography key.
Abstract: A quantum key distribution protocol based on quantum encryption is presented in this Brief Report. In this protocol, the previously shared Einstein-Podolsky-Rosen pairs act as the quantum key to encode and decode the classical cryptography key. The quantum key is reusable and the eavesdropper cannot elicit any information from the particle Alice sends to Bob. The concept of quantum encryption is also discussed.
Citations
More filters
Journal ArticleDOI
TL;DR: A protocol that combines the ideas of block transmission, the ping-pong quantum secure direct communication protocol, and quantum superdense coding has the advantage of being secure and of high source capacity.
Abstract: A protocol for quantum secure direct communication with quantum superdense coding is proposed. It combines the ideas of block transmission, the ping-pong quantum secure direct communication protocol, and quantum superdense coding. It has the advantage of being secure and of high source capacity.

833 citations

Journal ArticleDOI
TL;DR: A multi-step quantum secure direct communication protocol using blocks of multi-particle maximally entangled state is proposed, which has the advantage of high efficiency and high source capacity.

347 citations

Journal ArticleDOI
TL;DR: A theoretical scheme for secure quantum key distribution network following the ideas in quantum dense coding, where the server of the network provides the service for preparing and measuring the Bell states, and the users encode the states with local unitary operations.
Abstract: We propose a theoretical scheme for secure quantum key distribution network following the ideas in quantum dense coding. In this scheme, the server of the network provides the service for preparing and measuring the Bell states, and the users encode the states with local unitary operations. For preventing the server from eavesdropping, we design a decoy when the particle is transmitted between the users. The scheme has high capacity as one particle carries two bits of information and its efficiency for qubits approaches 100%. Moreover, it is unnecessary for the users to store the quantum states, which makes this scheme more convenient in applications than others.

228 citations

Repository
TL;DR: A collection of references (papers, books, preprints, book reviews, Ph. D. thesis, patents, web sites, etc.), sorted alphabetically and classified by subject, on foundations of quantum mechanics and quantum information can be found in this article.
Abstract: This is a collection of references (papers, books, preprints, book reviews, Ph. D. thesis, patents, web sites, etc.), sorted alphabetically and (some of them) classified by subject, on foundations of quantum mechanics and quantum information. Specifically, it covers hidden variables (``no-go'' theorems, experiments), interpretations of quantum mechanics, entanglement, quantum effects (quantum Zeno effect, quantum erasure, ``interaction-free'' measurements, quantum ``non-demolition'' measurements), quantum information (cryptography, cloning, dense coding, teleportation), and quantum computation.

192 citations

Journal ArticleDOI
TL;DR: In this article, generalized cat states for d-level systems were introduced and formulas for their entanglement swapping with generalized Bell states were obtained for both a generalization to the d-layer case and a transparent proof of validity for an already proposed protocol of secret sharing based on the cat states.
Abstract: We introduce generalized cat states for d-level systems and obtain concise formulas for their entanglement swapping with generalized Bell states. We then use this to provide both a generalization to the d-level case and a transparent proof of validity for an already proposed protocol of secret sharing based on entanglement swapping.

191 citations


Cites background or result from "Quantum key distribution via quantu..."

  • ...consecutive qudits, when the same Bell and Cat states are re-used. To compare our results with those of [4], it is enough to set all the original labels ui,vi,v′i = 0. It is then easy to see from fig. (5) that our results completely match the tables presented in that article. 8 5 Discussion We have provided closed formulas for entanglement swapping of d-level cat states and Bell states. We have then u...

    [...]

  • ...after all our additions are defined mod d. Note that Rd = I, compared to NOT2 = I. For any unitary operator U, the controlled operator Uc is naturally generalized as follows: Uc(|ii ⊗|ji) = |ii ⊗Ui|ji (5) Here the first and the second qudits are respectively the controller and the target qudits. In particular the controlled shift gates which play the role of CNOT gate, act as follows: Rc|i,ji = |i,j +i...

    [...]