Quantum cryptography: Public key distribution and coin tossing

  title={Quantum cryptography: Public key distribution and coin tossing},
  author={Charles H. Bennett and Gilles Brassard},
  journal={Theor. Comput. Sci.},
When elementary quantum systems, such as polarized photons, are used to transmit digital information, the uncertainty principle gives rise to novel cryptographic phenomena unachievable with traditional transmission media, e.g. a communications channel on which it is impossible in principle to eavesdrop without a high probability of disturbing the transmission in such a way as to be detected. Such a quantum channel can be used in conjunction with ordinary insecure classical channels to… 
Key Distillation Process on Quantum Cryptography Protocols in Network Security
Quantum cryptography is an effort to allow two users of a common communication channel to create a body of shared and secret information. This information, which generally takes the form of a random
Quantum cryptography is one of the major applications of quantum information theories. However, the Quantum key distribution (QKD) introduced by Bennett and Brassard in 1984 which is known as BB84
Practical secure quantum communications
  • E. Diamanti
  • Computer Science, Engineering
    Europe Optics + Optoelectronics
  • 2015
Practical implementations of two central protocols for quantum network applications, namely key distribution and coin flipping, are reviewed, demonstrating the protocols with provable security over record long distances in optical fibers and assessing the performance of the systems as well as their limitations.
Quantum-based secure communications with no prior key distribution
It is shown in this paper that quantum information processing can be used to do much more than just key distribution, and the quantum mechanical process of securely transmitting a message through a public channel is conceptually simpler than the two-step scenario with a quantum distributed classical key.
Quantum cryptography: Approaching communication security from a quantum perspective
  • A. Porzio
  • Mathematics
    2014 Fotonica AEIT Italian Conference on Photonics Technologies
  • 2014
Quantum cryptography aims at solving the everlasting problem of unconditional security in private communication. Every time we send personal information over a telecom channel a sophisticate
Practical quantum key distribution protocol without monitoring signal disturbance
It is found that a practical implementation using a laser pulse train achieves a key rate comparable to a decoy-state QKD protocol, an often-used technique for lasers and has a better tolerance of bit errors and of finite-sized-key effects.
Applications of Quantum Information
This chapter presents some applications of Quantum Information Theory that deviate from the problem of reliably transmitting classical information, and devote a paragraph to the topic of quantum teleportation, that is, the transfer of an unknown quantum state between two different locations that is achieved by making use of entanglement and only transmitting classicalInformation.
Fully device independent quantum key distribution
This work rigorously proves the device-independent security of an entanglement-based protocol building on Ekert's original proposal for quantum key distribution and builds on techniques from the classical theory of pseudo-randomness to achieve a new quantitative understanding of the non-local nature of quantum correlations.
Distributing Secret Keys with Quantum Continuous Variables: Principle, Security and Implementations
The principle of continuous-variable quantum key distribution is described, focusing in particular on protocols based on coherent states, and the security of these protocols is discussed and the state-of-the-art in experimental implementations are reported, including the issue of side-channel attacks.
Completely device-independent quantum key distribution
Quantum key distribution (QKD) is a provably secure way for two distant parties to establish a common secret key, which then can be used in a classical cryptographic scheme. Using quantum


Quantum Cryptography, or Unforgeable Subway Tokens
The use of quantum mechanical systems to record information gives rise to novel cryptographic phenomena, not achievable with classical recording media, including the multiplexing of two messages in such a way that either message may be recovered at the cost of irreversibly destroying the other.
A single quantum cannot be cloned
If a photon of definite polarization encounters an excited atom, there is typically some nonvanishing probability that the atom will emit a second photon by stimulated emission. Such a photon is
New Hash Functions and Their Use in Authentication and Set Equality
Several new classes of hash functions with certain desirable properties are exhibited, and two novel applications for hashing which make use of these functions are introduced, including a provably secure authentication technique for sending messages over insecure lines and the application of testing sets for equality.
Coin flipping by telephone a protocol for solving impossible problems
Coin-flipping has already proved useful in solving a number of problems once thought impossible: mental poker, certified mail, and exchange of secrets, and it will certainly prove a useful tool in solving other problems as well.
Conjugate coding
It is shown that in compensation for this "quantum noise", quantum mechanics allows us novel forms of coding without analogue in communication channels adequately described by classical physics.
Experimental Realization of Einstein-Podolsky-Rosen-Bohm Gedankenexperiment : A New Violation of Bell's Inequalities
The linear-polarization correlation of pairs of photons emitted in a radiative cascade of calcium has been measured. The new experimental scheme, using two-channel polarizers (i.e., optical analogs
Blun, 'Coin Flipping by Telephone-- a Protocol for Solving Impossible Problems', SI­
  • CACT News 15:1,
  • 1983
Conjugate Coding', (manu,.c.::.pt ea 1970); subsequent!
  • 1983
w.;esner, 'Conjugate Coding', (manu,.c.::.pt ea 1970); subsequent!:.; published in SICAC'i' ilcws 15:1
  • 1983
Experimental Reali:zn::.ion of the Einste.in Podolsky-Roscn-Bohm Gedankenexperiment, a New Violation of Bell's ln• equalities •
  • Phys.Rev.Lett
  • 1982