Quantum cryptography without public announcement of bases

被引:91
作者
Hwang, WY [1 ]
Koh, IG
Han, YD
机构
[1] Seoul Natl Univ, Dept Phys Educ, Seoul, South Korea
[2] Korea Adv Inst Sci & Technol, Dept Phys, Taejon 305701, South Korea
[3] Woosuk Univ, Dept Phys, Cheonbuk, South Korea
关键词
D O I
10.1016/S0375-9601(98)00358-2
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
We give a simple variation of the basic ideas of the BB84 quantum cryptographic scheme leading to a method of key expansion. A secure random sequence (the bases sequence) determines the encoding bases in a proposed scheme. Against incoherent attacks by Eve, using the bases sequence repeatedly is proven to be safe by quantum mechanical laws. (C) 1998 Elsevier Science B.V.
引用
收藏
页码:489 / 494
页数:6
相关论文
共 22 条
[1]   Quantum cryptography based on Wheeler's delayed choice experiment [J].
Ardehali, M .
PHYSICS LETTERS A, 1996, 217 (06) :301-304
[2]   QUANTUM CRYPTOGRAPHY USING ANY 2 NONORTHOGONAL STATES [J].
BENNETT, CH .
PHYSICAL REVIEW LETTERS, 1992, 68 (21) :3121-3124
[3]   QUANTUM CRYPTOGRAPHY WITHOUT BELL THEOREM [J].
BENNETT, CH ;
BRASSARD, G ;
MERMIN, ND .
PHYSICAL REVIEW LETTERS, 1992, 68 (05) :557-559
[4]   Bounds on information and the security of quantum cryptography [J].
Biham, E ;
Mor, T .
PHYSICAL REVIEW LETTERS, 1997, 79 (20) :4034-4037
[5]   Security of quantum cryptography against collective attacks [J].
Biham, E ;
Mor, T .
PHYSICAL REVIEW LETTERS, 1997, 78 (11) :2256-2259
[6]  
Bohm D., 1951, Quantum Theory
[7]  
BRASINSKY VB, 1992, QUANTUM MEASUREMENT, pCH3
[8]   Coherent eavesdropping strategies for the four state quantum cryptography protocol [J].
Cirac, JI ;
Gisin, N .
PHYSICS LETTERS A, 1997, 229 (01) :1-7
[9]  
DESPAGNAT B, 1976, CONCEPTUAL FDN QUANT, P46
[10]   Quantum privacy amplification and the security of quantum cryptography over noisy channels [J].
Deutsch, D ;
Ekert, A ;
Jozsa, R ;
Macchiavello, C ;
Popescu, S ;
Sanpera, A .
PHYSICAL REVIEW LETTERS, 1996, 77 (13) :2818-2821