# Counterfactual quantum cryptography.

@article{Noh2009CounterfactualQC, title={Counterfactual quantum cryptography.}, author={Tae-gon Noh}, journal={Physical review letters}, year={2009}, volume={103 23}, pages={ 230501 } }

Quantum cryptography allows one to distribute a secret key between two remote parties using the fundamental principles of quantum mechanics. The well-known established paradigm for the quantum key distribution relies on the actual transmission of signal particle through a quantum channel. In this Letter, we show that the task of a secret key distribution can be accomplished even though a particle carrying secret information is not in fact transmitted through the quantum channel. The proposed…

## Topics from this paper

## 165 Citations

Counterfactual quantum cryptography network with untrusted relay

- Computer Science
- 2015

An untrusted relay is used to construct a multi-user network to extend the scope of counterfactual quantum cryptography and prove the practical security advantages of the scheme by eliminating the probability that an eavesdropper can directly access the signal or an untr trusted relay can perform false operations.

Counterfactual Quantum Deterministic Key Distribution

- Computer Science
- 2013

By adding a controlled blocking operation module to the original protocol, the correlation between the polarizations of the two parties, Alice and Bob, is extended, therefore, one can distribute both deterministic keys and random ones using the protocol.

Experimental realization of counterfactual quantum cryptography

- Computer Science, Physics
- 2011

This letter fully implements the scheme for CQKD proposed in [1], demonstrating for the first time that information can be transmitted between two parties without the transmission of a carrier.

Counterfactual quantum key distribution without polarization encoding

- Mathematics
- 2013

In counterfactual quantum key distribution (QKD), two remote parties can share a secure
secret random key even without transmission of a physical particle (a non-vacuum pulse) through the
channel.…

Experimental Quantum Cryptography With Classical Users

- Computer Science, Physics
- 2019

A novel quantum cryptography scheme, where users are fully classical, which gives the users access to a superimposed single photon and the key exchange is achieved via interaction-free measurements on the shared state.

Relativistic quantum cryptography

- Physics
- 2014

A new protocol of quantum key distribution is proposed to transmit keys through free space. Along with quantum-mechanical restrictions on the discernibility of nonorthogonal quantum states, the…

Experimental demonstration of counterfactual quantum key distribution

- Computer Science, Physics
- 2011

The counterfactual quantum key distribution is experimentally realized in an unbalanced Mach-Zehnder interferometer of 12.5-km-long quantum channel with a high-fringe visibility and was robust against the photon-number-splitting attack.

Cryptanalysis and improvement of a multi-user quantum key distribution protocol

- Physics
- 2010

A multi-user quantum key distribution protocol [C.H. Hong et al., Opt. Commun. 283 (2010) 2644] was proposed, in which any two among n users of the system can communicate with each other, even though…

Quantum Identity Authentication in the Counterfactual Quantum Key Distribution Protocol

- Medicine, Computer ScienceEntropy
- 2019

An authenticated counterfactual quantum key distribution protocol is presented based on a novel strategy of mixing the two types of quantum cryptographic protocols randomly, which can be used to update the extent of the authentication keys.

Analysis of counterfactual quantum key distribution using error-correcting theory

- Computer ScienceQuantum Inf. Process.
- 2014

The analysis indicates that the security flaw in counterfactual quantum key distribution comes from the reason that the error rate in the users’ raw key pair is as high as that under the Eve’s attack when the loss rate exceeds 50 %.