Security of practical time-reversed EPR quantum key distribution

被引:64
作者
Inamori, H [1 ]
机构
[1] Univ Oxford, Ctr Quantum Computat, Oxford, England
关键词
quantum cryptography; quantum key distribution;
D O I
10.1007/s00453-002-0983-4
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
We propose a proof of the security of a time-reversed EPR quantum key distribution protocol against enemies with unlimited computational power. The considered protocol uses interactive key distillation, and the proof holds for implementations using imperfect photon sources.
引用
收藏
页码:340 / 365
页数:26
相关论文
共 35 条
[1]  
ASCHAUER H, 2000, QUANTPH0008051
[2]  
Bennett C. H., 1984, PROC IEEE INT C COMP, P175, DOI [DOI 10.1016/J.TCS.2014.05.025, 10.1016/j.tcs.2014.05.025]
[3]   QUANTUM CRYPTOGRAPHY USING ANY 2 NONORTHOGONAL STATES [J].
BENNETT, CH .
PHYSICAL REVIEW LETTERS, 1992, 68 (21) :3121-3124
[4]   QUANTUM CRYPTOGRAPHY WITHOUT BELL THEOREM [J].
BENNETT, CH ;
BRASSARD, G ;
MERMIN, ND .
PHYSICAL REVIEW LETTERS, 1992, 68 (05) :557-559
[5]  
BENOR M, UNPUB
[6]   Quantum cryptographic network based on quantum memories [J].
Biham, E ;
Huttner, B ;
Mor, T .
PHYSICAL REVIEW A, 1996, 54 (04) :2651-2658
[7]  
BIHAM E, 1999, QUANTPH9912053
[8]  
Brassard G., 1993, ADV CRYPTOLOGY, P410
[9]   Optimal eavesdropping in quantum cryptography with six states [J].
Bruss, D .
PHYSICAL REVIEW LETTERS, 1998, 81 (14) :3018-3021
[10]   Coherent eavesdropping strategies for the four state quantum cryptography protocol [J].
Cirac, JI ;
Gisin, N .
PHYSICS LETTERS A, 1997, 229 (01) :1-7