Secure Key Distribution via Pre- and Post-Selected Quantum States

  title={Secure Key Distribution via Pre- and Post-Selected Quantum States},
  author={Jeffrey Bub},
  journal={Physical Review A},
  • J. Bub
  • Published 19 June 2000
  • Physics
  • Physical Review A
A quantum key distribution scheme whose security depends on the features of pre- and post-selected quantum states is described. 
Cheat sensitive quantum bit commitment via pre- and post-selected quantum states
The analysis indicates that both of the two participants’ cheat strategies will be detected with non-zero probability, and the protocol can be implemented with today’s technology as a long-term quantum memory is not needed.
Quantum Key Distribution using Extended Mean King’s Problem
In the case of two receivers, it is indicated that the quantum key distribution is robust against the intercept-resend attacks by showing that the error occurs between the secret keys of a sender and receivers.
On the security of the quantum key distribution using the Mean King Problem
This paper discusses the quantum key distribution using the Mean King Problem which was proposed by J. Bub in 2001 and derives two trade-off inequalities showing that the larger Eve's information gain is, the higher the detectability becomes.
Quantum information and computation
In information processing, as in physics, the classical world view provides an incomplete approximation to an underlying quantum reality that can be harnessed to break codes, create unbreakable codes, and speed up otherwise intractable computations.
Quantum key distribution using Mean King problem with modified measurement schemes
It is shown that not all the solutions of the Mean King problem are available to construct a secure protocol and a protocol that is tolerant with three attack scenarios is considered and a trade-off inequality between Eve's information gain and error probability observed by the legitimate users is derived.
A Solution of Quantum Estimation Problem Using Quantum Error-Correcting Codes and Its Applications
It is shown that solving Mean King’s problem are necessary but are not sufficient to construct secure quantum key distribution protocol, and modification of measurement scheme in quantum key Distribution protocol using Mean King's problem is modified.
Distinguishability and Disturbance in the Quantum Key Distribution Protocol Using the Mean Multi-Kings’ Problem
The authors' inequalities show that eavesdropper’s extracting information regarding the secret keys inevitably induces disturbing the states and increasing the error probability of the bit sequence shared with the legitimate users.
Intercept/resend and translucent attacks on the quantum key distribution protocol based on the pre- and post-selection effect
From rigorous mathematical and numerical analyses, it is concluded that Bub’s protocol is weaker than the BennettBrassard protocol of 1984 (BB84) against both the intercept/resend and translucent attacks.


The Quantum Bit Commitment Theorem
The quantum bit commitment theorem is reviewed here and the central conceptual point, that an “Einstein–Podolsky–Rosen” attack or cheating strategy can always be applied, is clarified and the question of whether following such a cheat strategy can ever be disadvantageous to the cheater is considered and answered in the negative.
Spin measurement retrodiction revisited
The retrodiction of spin measurements along a set of different axes is revisited in detail. The problem is presented in two different pictures, a geometric and a general algebraic one. Explicit