scispace - formally typeset
Search or ask a question
Topic

Quantum cryptography

About: Quantum cryptography is a research topic. Over the lifetime, 7132 publications have been published within this topic receiving 262554 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: A protocol for quantum secure direct communication using blocks of Einstein-Podolsky-Rosen (EPR) pairs is proposed, and a set of ordered N EPR pairs is used as a data block for sending secret message directly.
Abstract: A protocol for quantum secure direct communication using blocks of Einstein-Podolsky-Rosen (EPR) pairs is proposed. A set of ordered N EPR pairs is used as a data block for sending secret message directly. The ordered N EPR set is divided into two particle sequences, a checking sequence and a message-coding sequence. After transmitting the checking sequence, the two parties of communication check eavesdropping by measuring a fraction of particles randomly chosen, with random choice of two sets of measuring bases. After insuring the security of the quantum channel, the sender Alice encodes the secret message directly on the message-coding sequence and sends them to Bob. By combining the checking and message-coding sequences together, Bob is able to read out the encoded messages directly. The scheme is secure because an eavesdropper cannot get both sequences simultaneously. We also discuss issues in a noisy channel.

1,580 citations

Journal ArticleDOI
TL;DR: The main result is a tight bound on the Holevo information between one of the authorized parties and the eavesdropper, as a function of the amount of violation of a Bell-type inequality.
Abstract: We present the optimal collective attack on a quantum key distribution protocol in the "device-independent" security scenario, where no assumptions are made about the way the quantum key distribution devices work or on what quantum system they operate. Our main result is a tight bound on the Holevo information between one of the authorized parties and the eavesdropper, as a function of the amount of violation of a Bell-type inequality.

1,504 citations

Journal ArticleDOI
TL;DR: In this article, a theoretical quantum key distribution scheme using EPR pairs is presented, which is efficient in that it uses all EPR pair in distributing the key except those chosen for checking eavesdroppers.
Abstract: A theoretical quantum key distribution scheme using Einstein-Podolsky-Rosen (EPR) pairs is presented. This scheme is efficient in that it uses all EPR pairs in distributing the key except those chosen for checking eavesdroppers. The high capacity is achieved because each EPR pair carries 2 bits of key code.

1,494 citations

Journal ArticleDOI
27 Jun 1994
TL;DR: This paper provides a general treatment of privacy amplification by public discussion, a concept introduced by Bennett, Brassard, and Robert for a special scenario, and yields results on wiretap and broadcast channels for a considerably strengthened definition of secrecy capacity.
Abstract: This paper, provides a general treatment of privacy amplification by public discussion, a concept introduced by Bennett, Brassard, and Robert for a special scenario. Privacy amplification is a process that allows two parties to distil a secret key from a common random variable about which an eavesdropper has partial information. The two parties generally know nothing about the eavesdropper's information except that it satisfies a certain constraint. The results have applications to unconditionally secure secret-key agreement protocols and quantum cryptography, and they yield results on wiretap and broadcast channels for a considerably strengthened definition of secrecy capacity.

1,493 citations

Journal ArticleDOI
TL;DR: The current state of research and future directions in quantum key distribution and quantum networks are reviewed in this paper, with a special emphasis on quantum key distributions and quantum key sharing in quantum networks.
Abstract: Quantum communication, and indeed quantum information in general, has changed the way we think about quantum physics In 1984 and 1991, the first protocol for quantum cryptography and the first application of quantum non-locality, respectively, attracted a diverse field of researchers in theoretical and experimental physics, mathematics and computer science Since then we have seen a fundamental shift in how we understand information when it is encoded in quantum systems We review the current state of research and future directions in this new field of science with special emphasis on quantum key distribution and quantum networks

1,420 citations


Network Information
Related Topics (5)
Quantum computer
30K papers, 907.2K citations
93% related
Quantum information
22.7K papers, 911.3K citations
93% related
Quantum entanglement
39.5K papers, 1M citations
90% related
Open quantum system
20.4K papers, 924.6K citations
89% related
Quantum
60K papers, 1.2M citations
86% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
2023185
2022366
2021265
2020349
2019343
2018338