Counterfactual Quantum Cryptography

被引:171
作者
Noh, Tae-Gon [1 ]
机构
[1] Elect & Telecommun Res Inst, Taejon 305700, South Korea
关键词
KEY DISTRIBUTION; UNCONDITIONAL SECURITY; ORTHOGONAL STATES; BELL THEOREM; INTERROGATION; COMPUTATION;
D O I
10.1103/PhysRevLett.103.230501
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Quantum cryptography allows one to distribute a secret key between two remote parties using the fundamental principles of quantum mechanics. The well-known established paradigm for the quantum key distribution relies on the actual transmission of signal particle through a quantum channel. In this Letter, we show that the task of a secret key distribution can be accomplished even though a particle carrying secret information is not in fact transmitted through the quantum channel. The proposed protocols can be implemented with current technologies and provide practical security advantages by eliminating the possibility that an eavesdropper can directly access the entire quantum system of each signal particle.
引用
收藏
页数:4
相关论文
共 33 条
[1]  
[Anonymous], 2001, LECT NOTES COMPUTER
[2]  
Bennett C.H., 1984, Theoretical Computer Science, P175, DOI [DOI 10.1016/J.TCS.2014.05.025, 10.1016/j.tcs.2014.05.025]
[3]   QUANTUM CRYPTOGRAPHY USING ANY 2 NONORTHOGONAL STATES [J].
BENNETT, CH .
PHYSICAL REVIEW LETTERS, 1992, 68 (21) :3121-3124
[4]   QUANTUM CRYPTOGRAPHY WITHOUT BELL THEOREM [J].
BENNETT, CH ;
BRASSARD, G ;
MERMIN, ND .
PHYSICAL REVIEW LETTERS, 1992, 68 (05) :557-559
[5]   Deterministic secure direct communication using entanglement -: art. no. 187902 [J].
Boström, K ;
Felbinger, T .
PHYSICAL REVIEW LETTERS, 2002, 89 (18) :187902/1-187902/4
[6]   Limitations on practical quantum cryptography [J].
Brassard, G ;
Lütkenhaus, N ;
Mor, T ;
Sanders, BC .
PHYSICAL REVIEW LETTERS, 2000, 85 (06) :1330-1333
[7]   The "ping-pong" protocol can be attacked without eavesdropping [J].
Cai, QY .
PHYSICAL REVIEW LETTERS, 2003, 91 (10)
[8]   Low cost and compact quantum key distribution [J].
Duligall, J. L. ;
Godfrey, M. S. ;
Harrison, K. A. ;
Munro, W. J. ;
Rarity, J. G. .
NEW JOURNAL OF PHYSICS, 2006, 8
[9]   QUANTUM CRYPTOGRAPHY BASED ON BELL THEOREM [J].
EKERT, AK .
PHYSICAL REVIEW LETTERS, 1991, 67 (06) :661-663
[10]   QUANTUM-MECHANICAL INTERACTION-FREE MEASUREMENTS [J].
ELITZUR, AC ;
VAIDMAN, L .
FOUNDATIONS OF PHYSICS, 1993, 23 (07) :987-997