Quantum cryptography: Public key distribution and coin tossing

  title={Quantum cryptography: Public key distribution and coin tossing},
  author={Charles H. Bennett and Gilles Brassard},
  journal={Theor. Comput. Sci.},

Key Distillation Process on Quantum Cryptography Protocols in Network Security

The advantage of quantum cryptography over traditional key exchange methods is that the exchange of information can be shown to be secure in a very strong sense, without making assumptions about the intractability of certain mathematical problems.


This work studies the depolarizing effect with an anisotropic probabilities of Bit-Flip, PhaseFlip and Bit-Phase-Flipper in the presence of an eavesdropper and proves that the phase flip probability act strongly on the exchanged information safety.

Practical secure quantum communications

  • E. Diamanti
  • Computer Science
    Europe Optics + Optoelectronics
  • 2015
Practical implementations of two central protocols for quantum network applications, namely key distribution and coin flipping, are reviewed, demonstrating the protocols with provable security over record long distances in optical fibers and assessing the performance of the systems as well as their limitations.

Quantum-based secure communications with no prior key distribution

It is shown in this paper that quantum information processing can be used to do much more than just key distribution, and the quantum mechanical process of securely transmitting a message through a public channel is conceptually simpler than the two-step scenario with a quantum distributed classical key.

Quantum cryptography: Approaching communication security from a quantum perspective

  • A. Porzio
  • Computer Science
    2014 Fotonica AEIT Italian Conference on Photonics Technologies
  • 2014
A survey on the physical principles underlying the quantum approach to cryptography, including superposition principle and uncertainty relations, are given and a possible continuous variable protocol is analyzed.

Practical quantum key distribution protocol without monitoring signal disturbance

It is found that a practical implementation using a laser pulse train achieves a key rate comparable to a decoy-state QKD protocol, an often-used technique for lasers and has a better tolerance of bit errors and of finite-sized-key effects.

Fully device independent quantum key distribution

This work rigorously proves the device-independent security of an entanglement-based protocol building on Ekert's original proposal for quantum key distribution and builds on techniques from the classical theory of pseudo-randomness to achieve a new quantitative understanding of the non-local nature of quantum correlations.

Applications of Quantum Information

This chapter presents some applications of Quantum Information Theory that deviate from the problem of reliably transmitting classical information, and devote a paragraph to the topic of quantum teleportation, that is, the transfer of an unknown quantum state between two different locations that is achieved by making use of entanglement and only transmitting classicalInformation.

Completely device-independent quantum key distribution

Using recent advances in the fields of randomness amplification and randomness expansion, it is demonstrated that it is sufficient for the message the parties want to communicate to be (partially) unknown to the adversaries -- an assumption without which any type of cryptography would be pointless to begin with.

Hacking energy-time-entanglement quantum key distribution using classical light

This work has shown that certain implementations of QKD are vulnerable to attack because of a flawed security proof, and described how an attacker might exploit this weakness to violate the supposedly unbreakable security ofQKD.



Quantum Cryptography, or Unforgeable Subway Tokens

The use of quantum mechanical systems to record information gives rise to novel cryptographic phenomena, not achievable with classical recording media, including the multiplexing of two messages in such a way that either message may be recovered at the cost of irreversibly destroying the other.

A single quantum cannot be cloned

If a photon of definite polarization encounters an excited atom, there is typically some nonvanishing probability that the atom will emit a second photon by stimulated emission. Such a photon is

New Hash Functions and Their Use in Authentication and Set Equality

Coin flipping by telephone a protocol for solving impossible problems

Coin-flipping has already proved useful in solving a number of problems once thought impossible: mental poker, certified mail, and exchange of secrets, and it will certainly prove a useful tool in solving other problems as well.

Conjugate coding

It is shown that in compensation for this "quantum noise", quantum mechanics allows us novel forms of coding without analogue in communication channels adequately described by classical physics.

Experimental Realization of Einstein-Podolsky-Rosen-Bohm Gedankenexperiment : A New Violation of Bell's Inequalities

The linear-polarization correlation of pairs of photons emitted in a radiative cascade of calcium has been measured. The new experimental scheme, using two-channel polarizers (i.e., optical analogs

w.;esner, 'Conjugate Coding', (manu,.c.::.pt ea 1970); subsequent!:.; published in SICAC'i' ilcws 15:1

  • 1983

Quantum Theory (Prentice-Hall, En­ glewood Cliffs

  • NJ 1951),
  • 1951