Experimental quantum cryptography

@article{Bennett2004ExperimentalQC,
  title={Experimental quantum cryptography},
  author={Charles H. Bennett and François Bessette and Gilles Brassard and Louis Salvail and John A. Smolin},
  journal={Journal of Cryptology},
  year={2004},
  volume={5},
  pages={3-28}
}
We describe results from an apparatus and protocol designed to implement quantum key distribution, by which two users, who share no secret information initially: (1) exchange a random quantum transmission, consisting of very faint flashes of polarized light; (2) by subsequent public discussion of the sent and received versions of this transmission estimate the extent of eavesdropping that might have taken place on it, and finally (3) if this estimate is small enough, distill from the sent and… Expand
101 Citations

Figures from this paper

Experimental realization of three quantum key distribution protocols
TLDR
Experimental verification of the BB84 protocol using three bases and experimental implementation of the B92 protocol, which was introduced by Charles Bennett in the year 1992, are performed. Expand
A Survey and Comparison of Some of the Most Prominent QKD Protocols
TLDR
This paper surveys some of the most prominent QKD protocols proposed till now, and then a comparative analysis on those protocols depending on various factors is performed. Expand
A Quantum Key Distribution Protocol Based on the EPR Pairs and Its Simulation
TLDR
A novel quantum key distribution protocol based on entanglement and dense coding is proposed, which does not need to store the qubits and the trade-off between information and disturbance is calculated under the intercept-measure-resend attack andEntanglement-me measure attack, which tells that the protocol is asymptotically secure. Expand
Ambiguous discrimination among linearly dependent quantum states and its application to two-way deterministic quantum key distribution
  • Hua Lu
  • Physics
  • Journal of the Optical Society of America B
  • 2019
It is impossible to distinguish a set of linearly dependent quantum states, which ensures the security of quantum key distribution (QKD). When considering some features such as symmetry, one mayExpand
Deterministic secure quantum communication with and without entanglement
We present a quantum protocol for sending a deterministic message by encrypting each classical bit by two photons and using a quantum key. The protocol has two varieties where the two photons can beExpand
Numerical finite-key analysis of quantum key distribution
TLDR
This work develops a robust numerical approach for calculating the key rates for QKD protocols in the finite-key regime in terms of two semi-definite programs (SDPs) that are formulated under the assumption of collective attacks from the eavesdropper and can be promoted to withstand coherent attacks using the postselection technique. Expand
Security of Quantum Cryptography
TLDR
The emphasis of this paper is to bring forth the newer security techniques paving way for information-theoretic security proofs leading to high QKD performance for market deployment, and discuss the recent quantum hacking on differentQKD protocols. Expand
An improved quantum key distribution protocol for verification
TLDR
This work tries to improve the data security by increase the key size shared between parties involved used in quantum cryptography, eliminating the problem of unsafe storage. Expand
Security of decoy-state protocols for general photon-number-splitting attacks
Decoy-state protocols provide a way to defeat photon-number splitting attacks in quantum cryptography implemented with weak coherent pulses. We point out that previous security analyses of suchExpand
Security and communication distance improvement in decoy states based quantum key distribution using pseudo-random bases choice for photon polarization measurement
This paper proposes a new quantum key distribution(QKD) protocol, namely the pseudo-random bases entangled photon based QKD (PRB-EPQKD) protocol. The latest mainly focuses on three properties,Expand
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 24 REFERENCES
Practical Quantum Oblivious Transfer
We describe a protocol for quantum oblivious transfer, utilizing faint pulses of polarized light, by which one of two mutually distrustful parties ("Alice") transmits two one-bit messages in such aExpand
Quantum Cryptography
TLDR
A remarkable surge of interest in the international scientific and industrial community has propelled quantum cryptography into mainstream computer science and physics and it is becoming increasingly practical at a fast pace. Expand
Quantum Cryptography, or Unforgeable Subway Tokens
TLDR
The use of quantum mechanical systems to record information gives rise to novel cryptographic phenomena, not achievable with classical recording media, including the multiplexing of two messages in such a way that either message may be recovered at the cost of irreversibly destroying the other. Expand
Quantum cryptography without Bell's theorem.
TLDR
A related but simpler EPR scheme is described and it is proved it secure against more general attacks, including substitution of a fake EPR source and the original 1984 key distribution scheme of Bennett and Brassard, which uses single particles instead of EPR pairs. Expand
An Update on Quantum Cryptography
TLDR
It is proved that no technology whatsoever, as well as no amount of computing power, could break some of the authors' schemes, as long as some of the most fundamental principles of quantum physics hold true. Expand
Experimental quantum cryptography: the dawn of a new era for quantum cryptography: the experimental prototype is working]
Quantum cryptography has recently entered the experimental era . The first convincingl y successful quantum exchange took place a few weeks ago . After a short historical revie w of quantumExpand
Achieving oblivious transfer using weakened security assumptions
  • C. Crépeau, J. Kilian
  • Computer Science
  • [Proceedings 1988] 29th Annual Symposium on Foundations of Computer Science
  • 1988
TLDR
The authors present some general techniques for establishing the cryptographic strength of a wide variety of games and show that a noisy telephone line is in fact a very sophisticated cryptographic device. Expand
Correct and private reductions among oblivious transfers
TLDR
This work formalizes the notion of a reduction, that is a method by which one form of oblivious transfer can be achieved under the assumption that another form exists abstractly, and shows correct and private reductions between various notions of oblivioustransfer. Expand
New Hash Functions and Their Use in Authentication and Set Equality
TLDR
Several new classes of hash functions with certain desirable properties are exhibited, and two novel applications for hashing which make use of these functions are introduced, including a provably secure authentication technique for sending messages over insecure lines and the application of testing sets for equality. Expand
Quantum cryptography based on Bell's theorem.
  • Ekert
  • Computer Science, Medicine
  • Physical review letters
  • 1991
Practical application of the generalized Bells theorem in the so-called key distribution process in cryptography is reported. The proposed scheme is based on the Bohms version of theExpand
...
1
2
3
...