White-light interferometric method for secure key distribution

被引:2
作者
Haist, Tobias [1 ]
Osten, Wolfgang [1 ]
机构
[1] Univ Stuttgart, Inst Tech Opt, Stuttgart, Germany
关键词
Cryptography; White-light interferometry; Quantum cryptography; QUANTUM; CRYPTOGRAPHY;
D O I
10.1007/s11227-010-0488-x
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A protocol for secure key distribution using classical light is proposed. The method relies on white-light interferometric measurements by one of the communicating parties and the random choice of delays by the other party. In this way, securely shared random keys are created, thereby enabling secure data transmission. In contrast to quantum key distribution, only classical waves are used. Single photons (and the practical problems associated with them) are avoided. The security of the method cannot be proven at the moment but different attacks are described and briefly analyzed.
引用
收藏
页码:656 / 662
页数:7
相关论文
共 12 条
[1]   QUANTUM CRYPTOGRAPHY USING ANY 2 NONORTHOGONAL STATES [J].
BENNETT, CH .
PHYSICAL REVIEW LETTERS, 1992, 68 (21) :3121-3124
[2]  
Delfs H., 2007, Introduction to cryptography: principles and applications
[3]   EAVESDROPPING ON QUANTUM-CRYPTOGRAPHICAL SYSTEMS [J].
EKERT, AK ;
HUTTNER, B ;
PALMA, GM ;
PERES, A .
PHYSICAL REVIEW A, 1994, 50 (02) :1047-1056
[4]  
Haist T, 2009, LECT NOTES COMPUT SC, V5882, P99, DOI 10.1007/978-3-642-10442-8_13
[5]   Quantum cryptography using pulsed homodyne detection [J].
Hirano, T ;
Yamanaka, H ;
Ashikaga, M ;
Konishi, I ;
Namiki, R .
PHYSICAL REVIEW A, 2003, 68 (04) :7
[6]   QUANTUM CRYPTOGRAPHY WITH COHERENT STATES [J].
HUTTNER, B ;
IMOTO, N ;
GISIN, N ;
MOR, T .
PHYSICAL REVIEW A, 1995, 51 (03) :1863-1869
[7]   A practical protocol for advantage distillation and information reconciliation [J].
Liu, SL ;
Van Tilborg, HCA ;
Van Dijk, M .
DESIGNS CODES AND CRYPTOGRAPHY, 2003, 30 (01) :39-62
[8]   Unconditionally secure key agreement and the intrinsic conditional information [J].
Maurer, UM ;
Wolf, S .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1999, 45 (02) :499-514
[9]  
Mermin N. D., 2007, Quantum Computer Science
[10]   COMMUNICATION THEORY OF SECRECY SYSTEMS [J].
SHANNON, CE .
BELL SYSTEM TECHNICAL JOURNAL, 1949, 28 (04) :656-715