Corpus ID: 199452778

Experimental Quantum Cryptography With Classical Users

@article{Massa2019ExperimentalQC,
  title={Experimental Quantum Cryptography With Classical Users},
  author={Francesco Massa and Preeti Yadav and Amir Moqanaki and Walter O. Krawec and Paulo Mateus and N. Paunkovi'c and Andr{\'e} Souto and Philip Walther},
  journal={arXiv: Quantum Physics},
  year={2019}
}
The exploit of quantum systems allows for insights that promise to revolutionise information processing, although a main challenge for practical implementations is technological complexity. Due to its feasibility, quantum cryptography, which allows for perfectly secure communication, has become the most prominent application of quantum technology. Nevertheless, this task still requires the users to be capable of performing quantum operations, such as state preparation or measurements in… Expand

Figures and Tables from this paper

Semi-quantum cryptography
TLDR
The history and current state-of-the-art in semi-quantum research is surveyed, including security proof methods and how classical post-processing can be used to counteract users' inability to perform certain quantum operations. Expand
High-Dimensional Semiquantum Cryptography
TLDR
It is shown that, similar to the fully quantum key distribution case, high-dimensional systems can increase the noise tolerance in the semiquantum case and several general security results are proved which are applicable to other (S)QKD protocols (both high- dimensional ones and standard qubit-based protocols) utilizing a two-way quantum channel. Expand
Lightweight Mediated Semi-Quantum Key Distribution Protocol with a Dishonest Third Party based on Bell States
TLDR
This study takes Bell states as the quantum resource to propose a new MSQKD protocol, in which the classical participants do not need a Trojan horse detector and the TP is dishonest, and the proposed protocol is shown to be secure against well-known attacks and the Classical participants only need two quantum capabilities. Expand
Coherence Equality and Communication in a Quantum Superposition.
TLDR
This Letter introduces a "coherence equality" that is satisfied by any classical communication-i.e., conveyed by a localized carrier traveling along well defined directions, and develops two simple quantum schemes that deviate systematically from the classical value, thus, violating the coherence equality. Expand
Semi-device-independent quantum key distribution based on a coherence equality
We introduce the first example of a semi-device-independent quantum key distribution (SDIQKD) protocol with a classical Alice and Bob. The protocol is based on the Coherence Equality (CE) gameExpand

References

SHOWING 1-10 OF 34 REFERENCES
Quantum cryptography: Public key distribution and coin tossing
TLDR
A protocol for coin-tossing by exchange of quantum messages is presented, which is secure against traditional kinds of cheating, even by an opponent with unlimited computing power, but ironically can be subverted by use of a still subtler quantum phenomenon, the Einstein-Podolsky-Rosen paradox. Expand
Counterfactual quantum cryptography.
  • T. Noh
  • Physics, Medicine
  • Physical review letters
  • 2009
TLDR
This Letter shows that the task of a secret key distribution can be accomplished even though a particle carrying secret information is not in fact transmitted through the quantum channel, and proposes protocols to implement this task. Expand
Mediated semiquantum key distribution
In this paper, we design a new quantum key distribution protocol, allowing two limited semi-quantum or "classical" users to establish a shared secret key with the help of a fully quantum server. AExpand
Security proof of a semi-quantum key distribution protocol
  • Walter O. Krawec
  • Computer Science, Physics
  • 2015 IEEE International Symposium on Information Theory (ISIT)
  • 2015
TLDR
This paper proves the unconditional security of a particular semi-quantum protocol and derive an expression for its key rate, in the asymptotic scenario. Expand
Quantum cryptography with realistic devices
TLDR
Recent advances, such as the measurement-device-independent QKD protocol, have closed the critical side channels in the physical implementations, enabling secure QKKD with realistic devices. Expand
Experimental demonstration of counterfactual quantum communication.
TLDR
This work experimentally demonstrated, for the first time, a faithful implementation for a striking scheme called "counterfactual quantum cryptography" with an on-table realization operating at telecom wavelengths, and reported an illustration on a 1 km fiber. Expand
Security of a single-state semi-quantum key distribution protocol
TLDR
This paper proves the unconditional security of a single-state semi-quantum key distribution protocol proposed by Zou et al. by deriving a lower bound of the protocol’s key rate in the asymptotic scenario and figuring out an error threshold value such that for all error rates that are less than this threshold value, the secure secret key can be established between the legitimate users definitely. Expand
Quantum cryptography with finite resources: unconditional security bound for discrete-variable protocols with one-way postprocessing.
TLDR
A bound for the security of quantum key distribution with finite resources under one-way postprocessing is derived, based on a definition of security that is composable and has an operational meaning, for standard protocols such as Bennett-Brassard 1984 and six-states protocol. Expand
Quantum key distribution with mismatched measurements over arbitrary channels
TLDR
This paper derives key-rate expressions for different quantum key distribution protocols from multiple channel statistics, including those gathered from mismatched measurement bases, and demonstrates that their tolerance to noise is higher than previously thought. Expand
Semi-Quantum Key Distribution
TLDR
This work presents two protocols with this constraint, and proves their robustness against attacks: it is proved that any attempt of an adversary to obtain information necessarily induces some errors that the legitimate parties could notice. Expand
...
1
2
3
4
...