Quantum cryptography: Public key distribution and coin tossing

被引:2534
作者
Bennett, Charles H. [1 ]
Brassard, Gilles [2 ]
机构
[1] IBM Res, Yorktown Hts, NY 10598 USA
[2] Univ Montreal, Dept IRO, Montreal, PQ H3C 3J7, Canada
关键词
Probability distributions - Quantum cryptography - Quantum communication - Quantum entanglement - Communication channels (information theory) - Photons;
D O I
10.1016/j.tcs.2014.05.025
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Charles H.Bennett and GillesBrassard use a radically different foundation for cryptography, the uncertainty principle of quantum physics. They also present a protocol for coin-tossing by exchange of quantum messages, which is secure against traditional kinds of cheating, even by an opponent with unlimited computing power, but ironically can be subverted by use of a still subtler quantum phenomenon, the Einstein-Podolsky-Rosen (EPR) paradox. In quantum public key distribution, the quantum channel is not used directly to send meaningful messages, but is rather used to transmit a supply of random bits between two users who share no secret information initially, in such a way that the users, by subsequent consultation over an ordinary non-quantum channel subject to passive eavesdropping, can tell with high probability whether the original quantum transmission has been disturbed in transit, as it would be by an eavesdropper. The EPR effect occurs when certain types of atom or molecule decay with the emission of two photons, and consists of the fact that the two photons are always found to have opposite polarization, regardless of the basis used to observe them, provided both are observed in the same basis. Verbal explanation of the EPR effect is to say that the two photons are produced in an initial state of undefined polarization; and when one of them is measured, the measuring apparatus forces it to choose a polarization while simultaneously forcing the other unmeasured photon, no matter how far away, to choose the opposite polarization.
引用
收藏
页码:7 / 11
页数:5
相关论文
共 7 条
[1]  
[Anonymous], 1951, QUANTUM THEORY
[2]   EXPERIMENTAL REALIZATION OF EINSTEIN-PODOLSKY-ROSEN-BOHM GEDANKENEXPERIMENT - A NEW VIOLATION OF BELL INEQUALITIES [J].
ASPECT, A ;
GRANGIER, P ;
ROGER, G .
PHYSICAL REVIEW LETTERS, 1982, 49 (02) :91-94
[3]  
Bennett C. H., 1983, Advances in Cryptology, Proceedings of Crypto 82, P267
[4]  
Blum M., 1983, SIGACT News, V15, P23, DOI 10.1145/1008908.1008911
[5]   NEW HASH FUNCTIONS AND THEIR USE IN AUTHENTICATION AND SET EQUALITY [J].
WEGMAN, MN ;
CARTER, JL .
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 1981, 22 (03) :265-279
[6]  
Wiesner S., 1983, SIGACT News, V15, P78, DOI 10.1145/1008908.1008920
[7]   A SINGLE QUANTUM CANNOT BE CLONED [J].
WOOTTERS, WK ;
ZUREK, WH .
NATURE, 1982, 299 (5886) :802-803