Counterfactual quantum cryptography.

  title={Counterfactual quantum cryptography.},
  author={Tae-gon Noh},
  journal={Physical review letters},
  volume={103 23},
  • T. Noh
  • Published 23 September 2008
  • Physics, Medicine
  • Physical review letters
Quantum cryptography allows one to distribute a secret key between two remote parties using the fundamental principles of quantum mechanics. The well-known established paradigm for the quantum key distribution relies on the actual transmission of signal particle through a quantum channel. In this Letter, we show that the task of a secret key distribution can be accomplished even though a particle carrying secret information is not in fact transmitted through the quantum channel. The proposed… 
Counterfactual quantum cryptography network with untrusted relay
An untrusted relay is used to construct a multi-user network to extend the scope of counterfactual quantum cryptography and prove the practical security advantages of the scheme by eliminating the probability that an eavesdropper can directly access the signal or an untr trusted relay can perform false operations.
Counterfactual Quantum Deterministic Key Distribution
By adding a controlled blocking operation module to the original protocol, the correlation between the polarizations of the two parties, Alice and Bob, is extended, therefore, one can distribute both deterministic keys and random ones using the protocol.
Experimental realization of counterfactual quantum cryptography
This letter fully implements the scheme for CQKD proposed in [1], demonstrating for the first time that information can be transmitted between two parties without the transmission of a carrier.
Counterfactual quantum key distribution without polarization encoding
In counterfactual quantum key distribution (QKD), two remote parties can share a secure secret random key even without transmission of a physical particle (a non-vacuum pulse) through the channel.
Experimental Quantum Cryptography With Classical Users
A novel quantum cryptography scheme, where users are fully classical, which gives the users access to a superimposed single photon and the key exchange is achieved via interaction-free measurements on the shared state.
Relativistic quantum cryptography
A new protocol of quantum key distribution is proposed to transmit keys through free space. Along with quantum-mechanical restrictions on the discernibility of nonorthogonal quantum states, the
Experimental demonstration of counterfactual quantum key distribution
The counterfactual quantum key distribution is experimentally realized in an unbalanced Mach-Zehnder interferometer of 12.5-km-long quantum channel with a high-fringe visibility and was robust against the photon-number-splitting attack.
Cryptanalysis and improvement of a multi-user quantum key distribution protocol
A multi-user quantum key distribution protocol [C.H. Hong et al., Opt. Commun. 283 (2010) 2644] was proposed, in which any two among n users of the system can communicate with each other, even though
Quantum Identity Authentication in the Counterfactual Quantum Key Distribution Protocol
An authenticated counterfactual quantum key distribution protocol is presented based on a novel strategy of mixing the two types of quantum cryptographic protocols randomly, which can be used to update the extent of the authentication keys.
Analysis of counterfactual quantum key distribution using error-correcting theory
The analysis indicates that the security flaw in counterfactual quantum key distribution comes from the reason that the error rate in the users’ raw key pair is as high as that under the Eve’s attack when the loss rate exceeds 50 %.