# Quantum cryptography: Public key distribution and coin tossing

@article{Bennett2014QuantumCP, title={Quantum cryptography: Public key distribution and coin tossing}, author={Charles H. Bennett and Gilles Brassard}, journal={Theor. Comput. Sci.}, year={2014}, volume={560}, pages={7-11} }

When elementary quantum systems, such as polarized photons, are used to transmit digital information, the uncertainty principle gives rise to novel cryptographic phenomena unachievable with traditional transmission media, e.g. a communications channel on which it is impossible in principle to eavesdrop without a high probability of disturbing the transmission in such a way as to be detected. Such a quantum channel can be used in conjunction with ordinary insecure classical channels to…

## Topics from this paper

## 4,831 Citations

Key Distillation Process on Quantum Cryptography Protocols in Network Security

- Mathematics
- 2012

Quantum cryptography is an effort to allow two users of a common communication channel to create a body of shared and secret information. This information, which generally takes the form of a random…

QUANTUM KEY DISTRIBUTION THROUGH AN ANISOTROPIC DEPOLARIZING QUANTUM CHANNEL

- 2017

Quantum cryptography is one of the major applications of quantum information theories. However, the Quantum key distribution (QKD) introduced by Bennett and Brassard in 1984 which is known as BB84…

Practical secure quantum communications

- Computer Science, EngineeringEurope Optics + Optoelectronics
- 2015

Practical implementations of two central protocols for quantum network applications, namely key distribution and coin flipping, are reviewed, demonstrating the protocols with provable security over record long distances in optical fibers and assessing the performance of the systems as well as their limitations.

Quantum-based secure communications with no prior key distribution

- Mathematics, Computer ScienceSoft Comput.
- 2016

It is shown in this paper that quantum information processing can be used to do much more than just key distribution, and the quantum mechanical process of securely transmitting a message through a public channel is conceptually simpler than the two-step scenario with a quantum distributed classical key.

Quantum cryptography: Approaching communication security from a quantum perspective

- Mathematics2014 Fotonica AEIT Italian Conference on Photonics Technologies
- 2014

Quantum cryptography aims at solving the everlasting problem of unconditional security in private communication. Every time we send personal information over a telecom channel a sophisticate…

Practical quantum key distribution protocol without monitoring signal disturbance

- Computer Science, MedicineNature
- 2014

It is found that a practical implementation using a laser pulse train achieves a key rate comparable to a decoy-state QKD protocol, an often-used technique for lasers and has a better tolerance of bit errors and of finite-sized-key effects.

Applications of Quantum Information

- Computer Science
- 2015

This chapter presents some applications of Quantum Information Theory that deviate from the problem of reliably transmitting classical information, and devote a paragraph to the topic of quantum teleportation, that is, the transfer of an unknown quantum state between two different locations that is achieved by making use of entanglement and only transmitting classicalInformation.

Fully device independent quantum key distribution

- Physics, MedicineCommun. ACM
- 2019

This work rigorously proves the device-independent security of an entanglement-based protocol building on Ekert's original proposal for quantum key distribution and builds on techniques from the classical theory of pseudo-randomness to achieve a new quantitative understanding of the non-local nature of quantum correlations.

Distributing Secret Keys with Quantum Continuous Variables: Principle, Security and Implementations

- Computer Science, MathematicsEntropy
- 2015

The principle of continuous-variable quantum key distribution is described, focusing in particular on protocols based on coherent states, and the security of these protocols is discussed and the state-of-the-art in experimental implementations are reported, including the issue of side-channel attacks.

Completely device-independent quantum key distribution

- Physics
- 2016

Quantum key distribution (QKD) is a provably secure way for two distant parties to establish a common secret key, which then can be used in a classical cryptographic scheme. Using quantum…

## References

SHOWING 1-10 OF 12 REFERENCES

Quantum Cryptography, or Unforgeable Subway Tokens

- Computer ScienceCRYPTO
- 1982

The use of quantum mechanical systems to record information gives rise to novel cryptographic phenomena, not achievable with classical recording media, including the multiplexing of two messages in such a way that either message may be recovered at the cost of irreversibly destroying the other.

A single quantum cannot be cloned

- PhysicsNature
- 1982

If a photon of definite polarization encounters an excited atom, there is typically some nonvanishing probability that the atom will emit a second photon by stimulated emission. Such a photon is…

New Hash Functions and Their Use in Authentication and Set Equality

- Computer Science, MathematicsJ. Comput. Syst. Sci.
- 1981

Several new classes of hash functions with certain desirable properties are exhibited, and two novel applications for hashing which make use of these functions are introduced, including a provably secure authentication technique for sending messages over insecure lines and the application of testing sets for equality.

Coin flipping by telephone a protocol for solving impossible problems

- Computer ScienceSIGA
- 1983

Coin-flipping has already proved useful in solving a number of problems once thought impossible: mental poker, certified mail, and exchange of secrets, and it will certainly prove a useful tool in solving other problems as well.

Conjugate coding

- Computer ScienceSIGA
- 1983

It is shown that in compensation for this "quantum noise", quantum mechanics allows us novel forms of coding without analogue in communication channels adequately described by classical physics.

Experimental Realization of Einstein-Podolsky-Rosen-Bohm Gedankenexperiment : A New Violation of Bell's Inequalities

- Physics
- 1982

The linear-polarization correlation of pairs of photons emitted in a radiative cascade of calcium has been measured. The new experimental scheme, using two-channel polarizers (i.e., optical analogs…

Blun, 'Coin Flipping by Telephone-- a Protocol for Solving Impossible Problems', SI

- CACT News 15:1,
- 1983

Conjugate Coding', (manu,.c.::.pt ea 1970); subsequent!

- 1983

w.;esner, 'Conjugate Coding', (manu,.c.::.pt ea 1970); subsequent!:.; published in SICAC'i' ilcws 15:1

- 1983

Experimental Reali:zn::.ion of the Einste.in Podolsky-Roscn-Bohm Gedankenexperiment, a New Violation of Bell's ln• equalities •

- Phys.Rev.Lett
- 1982