Secrecy, computational loads and rates in practical quantum cryptography

被引:18
作者
Gilbert, G [1 ]
Hamrick, M [1 ]
机构
[1] Mitre Corp, Mclean, VA 22102 USA
关键词
quantum cryptography; optical communications; fiber optic propagation; privacy amplification; communications security; error correction; software performance;
D O I
10.1007/s00453-002-0977-2
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
A number of questions associated with practical implementations of quantum cryptography systems having to do with unconditional secrecy. computational loads and effective secrecy rates in the presence of perfect and imperfect sources are discussed. The different types of unconditional secrecy, and their relationship to general communications security, are discussed in the context of quantum cryptography. In order to carry out a quantum cryptography protocol it is necessary that sufficient computational resources be available to perform the various processing steps, such as sifting, error correction, privacy amplification and authentication. We display the full computer machine instruction requirements needed to support a practical quantum cryptography implementation. We carry out a numerical comparison of system performance characteristics for implementations that make use of either weak coherent sources of light or perfect single photon sources, for eavesdroppers making individual attacks on the quantum channel characterized by different levels of technological capability. We find that. while in some circumstances it is best to employ perfect single photon sources, in other situations it is preferable to utilize weak coherent sources. fit either case the secrecy level of the final shared cipher is identical, with the relevant distinguishing figure-of-merit being the effective throughput rate.
引用
收藏
页码:314 / 339
页数:26
相关论文
共 30 条
[1]  
Bennett C. H., 1992, Journal of Cryptology, V5, P3, DOI 10.1007/BF00191318
[2]  
Bennett C. H., 1984, PROC IEEE INT C COMP, P175, DOI [DOI 10.1016/J.TCS.2014.05.025, 10.1016/j.tcs.2014.05.025]
[3]   Generalized privacy amplification [J].
Bennett, CH ;
Brassard, G ;
Crepeau, C ;
Maurer, UM .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1995, 41 (06) :1915-1923
[4]  
BIHAM E, 1999, QUANTPH9912053
[5]   Limitations on practical quantum cryptography [J].
Brassard, G ;
Lütkenhaus, N ;
Mor, T ;
Sanders, BC .
PHYSICAL REVIEW LETTERS, 2000, 85 (06) :1330-1333
[6]  
BRASSARD G, 1999, QUANTPH9911054
[7]  
Brassard G., 1994, LECT NOTES COMPUTER, V765, P410, DOI [DOI 10.1007/3-540-48285-7_35, 10.1007/3-540-48285-7_35]
[8]  
BROURI R, 2000, QUANTPH0007037
[9]   Triggered source of single photons based on controlled single molecule fluorescence [J].
Brunel, C ;
Lounis, B ;
Tamarat, P ;
Orrit, M .
PHYSICAL REVIEW LETTERS, 1999, 83 (14) :2722-2725
[10]  
BUTTLER WT, 2000, QUANTPH0001088