# Secure Key Distribution via Pre- and Post-Selected Quantum States

@article{Bub2001SecureKD, title={Secure Key Distribution via Pre- and Post-Selected Quantum States}, author={Jeffrey Bub}, journal={Physical Review A}, year={2001}, volume={63}, pages={032309} }

A quantum key distribution scheme whose security depends on the features of pre- and post-selected quantum states is described.

## 20 Citations

Cheat sensitive quantum bit commitment via pre- and post-selected quantum states

- Computer Science, PhysicsQuantum Inf. Process.
- 2014

The analysis indicates that both of the two participants’ cheat strategies will be detected with non-zero probability, and the protocol can be implemented with today’s technology as a long-term quantum memory is not needed.

Quantum Key Distribution using Extended Mean King’s Problem

- Mathematics, Computer Science2018 International Symposium on Information Theory and Its Applications (ISITA)
- 2018

In the case of two receivers, it is indicated that the quantum key distribution is robust against the intercept-resend attacks by showing that the error occurs between the secret keys of a sender and receivers.

On the security of the quantum key distribution using the Mean King Problem

- Computer Science2010 International Symposium On Information Theory & Its Applications
- 2010

This paper discusses the quantum key distribution using the Mean King Problem which was proposed by J. Bub in 2001 and derives two trade-off inequalities showing that the larger Eve's information gain is, the higher the detectability becomes.

Quantum information and computation

- Computer Science, PhysicsNature
- 2000

In information processing, as in physics, the classical world view provides an incomplete approximation to an underlying quantum reality that can be harnessed to break codes, create unbreakable codes, and speed up otherwise intractable computations.

Quantum key distribution using Mean King problem with modified measurement schemes

- Mathematics2012 International Symposium on Information Theory and its Applications
- 2012

It is shown that not all the solutions of the Mean King problem are available to construct a secure protocol and a protocol that is tolerant with three attack scenarios is considered and a trade-off inequality between Eve's information gain and error probability observed by the legitimate users is derived.

A Solution of Quantum Estimation Problem Using Quantum Error-Correcting Codes and Its Applications

- Computer Science
- 2012

It is shown that solving Mean King’s problem are necessary but are not sufficient to construct secure quantum key distribution protocol, and modification of measurement scheme in quantum key Distribution protocol using Mean King's problem is modified.

Distinguishability and Disturbance in the Quantum Key Distribution Protocol Using the Mean Multi-Kings’ Problem

- Computer ScienceEntropy
- 2020

The authors' inequalities show that eavesdropper’s extracting information regarding the secret keys inevitably induces disturbing the states and increasing the error probability of the bit sequence shared with the legitimate users.

Intercept/resend and translucent attacks on the quantum key distribution protocol based on the pre- and post-selection effect

- Computer Science
- 2021

From rigorous mathematical and numerical analyses, it is concluded that Bub’s protocol is weaker than the BennettBrassard protocol of 1984 (BB84) against both the intercept/resend and translucent attacks.

## References

SHOWING 1-2 OF 2 REFERENCES

The Quantum Bit Commitment Theorem

- Physics
- 2000

The quantum bit commitment theorem is reviewed here and the central conceptual point, that an “Einstein–Podolsky–Rosen” attack or cheating strategy can always be applied, is clarified and the question of whether following such a cheat strategy can ever be disadvantageous to the cheater is considered and answered in the negative.

Spin measurement retrodiction revisited

- Physics
- 2000

The retrodiction of spin measurements along a set of different axes is revisited in detail. The problem is presented in two different pictures, a geometric and a general algebraic one. Explicit…