Counterfactual quantum cryptography.

@article{Noh2009CounterfactualQC,
  title={Counterfactual quantum cryptography.},
  author={Tae-gon Noh},
  journal={Physical review letters},
  year={2009},
  volume={103 23},
  pages={
          230501
        }
}
  • T. Noh
  • Published 23 September 2008
  • Physics, Medicine
  • Physical review letters
Quantum cryptography allows one to distribute a secret key between two remote parties using the fundamental principles of quantum mechanics. The well-known established paradigm for the quantum key distribution relies on the actual transmission of signal particle through a quantum channel. In this Letter, we show that the task of a secret key distribution can be accomplished even though a particle carrying secret information is not in fact transmitted through the quantum channel. The proposed… Expand
Counterfactual quantum cryptography network with untrusted relay
TLDR
An untrusted relay is used to construct a multi-user network to extend the scope of counterfactual quantum cryptography and prove the practical security advantages of the scheme by eliminating the probability that an eavesdropper can directly access the signal or an untr trusted relay can perform false operations. Expand
Counterfactual Quantum Deterministic Key Distribution
TLDR
By adding a controlled blocking operation module to the original protocol, the correlation between the polarizations of the two parties, Alice and Bob, is extended, therefore, one can distribute both deterministic keys and random ones using the protocol. Expand
Experimental realization of counterfactual quantum cryptography
TLDR
This letter fully implements the scheme for CQKD proposed in [1], demonstrating for the first time that information can be transmitted between two parties without the transmission of a carrier. Expand
Counterfactual quantum key distribution without polarization encoding
In counterfactual quantum key distribution (QKD), two remote parties can share a secure secret random key even without transmission of a physical particle (a non-vacuum pulse) through the channel.Expand
Experimental Quantum Cryptography With Classical Users
TLDR
A novel quantum cryptography scheme, where users are fully classical, which gives the users access to a superimposed single photon and the key exchange is achieved via interaction-free measurements on the shared state. Expand
Relativistic quantum cryptography
A new protocol of quantum key distribution is proposed to transmit keys through free space. Along with quantum-mechanical restrictions on the discernibility of nonorthogonal quantum states, theExpand
Experimental demonstration of counterfactual quantum key distribution
TLDR
The counterfactual quantum key distribution is experimentally realized in an unbalanced Mach-Zehnder interferometer of 12.5-km-long quantum channel with a high-fringe visibility and was robust against the photon-number-splitting attack. Expand
Cryptanalysis and improvement of a multi-user quantum key distribution protocol
A multi-user quantum key distribution protocol [C.H. Hong et al., Opt. Commun. 283 (2010) 2644] was proposed, in which any two among n users of the system can communicate with each other, even thoughExpand
Quantum Identity Authentication in the Counterfactual Quantum Key Distribution Protocol
TLDR
An authenticated counterfactual quantum key distribution protocol is presented based on a novel strategy of mixing the two types of quantum cryptographic protocols randomly, which can be used to update the extent of the authentication keys. Expand
Analysis of counterfactual quantum key distribution using error-correcting theory
TLDR
The analysis indicates that the security flaw in counterfactual quantum key distribution comes from the reason that the error rate in the users’ raw key pair is as high as that under the Eve’s attack when the loss rate exceeds 50 %. Expand
...
1
2
3
4
5
...