Has Quantum cryptography been proven secure?

被引:0
作者
Nakassis, Tassos [1 ]
Bienfang, J. C. [1 ]
Johnson, P. [1 ]
Mink, A. [1 ]
Rogers, D. [1 ]
Tang, X. [1 ]
Williams, C. J. [1 ]
机构
[1] NIST, 100 Bur Dr, Gaithersburg, MD 20899 USA
来源
QUANTUM INFORMATION AND COMPUTATION IV | 2006年 / 6244卷
关键词
quantum cryptography; reconciliation; privacy amplification; BB84; renyi entropy;
D O I
10.1117/12.665086
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Quantum cryptography asserts that shared secrets can be established over public channels in such a way that the total information of an eavesdropper can be made arbitrarily small with probability arbitrarily close to 1. As we will show below, the current state of affairs, especially as it pertains to engineering issues, leaves something to be desired.
引用
收藏
页数:9
相关论文
共 14 条
[1]  
[Anonymous], CURRENT STATUS DARPA
[2]  
[Anonymous], 2002, NEW J PHYS
[3]  
Bennet C.H., 1988, SIAM J COMPUT, V17
[4]  
Bennett C. H., 1992, J CRYPTOLOGY, V5
[5]   Generalized privacy amplification [J].
Bennett, CH ;
Brassard, G ;
Crepeau, C ;
Maurer, UM .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1995, 41 (06) :1915-1923
[6]  
Brassard G., 1994, LECT NOTES COMPUTER, V765, P410, DOI [DOI 10.1007/3-540-48285-7_35, 10.1007/3-540-48285-7_35]
[7]   Linking information reconciliation and privacy amplification [J].
Cachin, C ;
Maurer, UM .
JOURNAL OF CRYPTOLOGY, 1997, 10 (02) :97-110
[8]  
ELLIOTT C, 2003, SIGCOMM 03 P 2003 C, P227
[9]  
GOLDWATER S, 1996, QUANTUM CRYPTOGRAPHY
[10]   Decoy state quantum key distribution [J].
Lo, HK ;
Ma, XF ;
Chen, K .
PHYSICAL REVIEW LETTERS, 2005, 94 (23)