Abstract
We present strong attacks against quantum key distribution schemes which use\nquantum memories and quantum gates to attack directly the final key. We analyze\na specific attack of this type, for which we find the density matrices\navailable to the eavesdropper and the optimal information which can be\nextracted from them. We prove security against this attack and discuss security\nagainst any attack allowed by the rules of quantum mechanics.\n
Keywords
Affiliated Institutions
Related Publications
Quantum cryptography based on Bell’s theorem
Practical application of the generalized Bell's theorem in the so-called key distribution process in cryptography is reported. The proposed scheme is based on the Bohm's version...
Quantum Computing in the NISQ era and beyond
Noisy Intermediate-Scale Quantum (NISQ) technology will be available in the near future. Quantum computers with 50-100 qubits may be able to perform tasks which surpass the capa...
Quantum computational networks
The theory of quantum computational networks is the quantum generalization of the theory of logic circuits used in classical computing machines. Quantum gates are the generaliza...
OceanStore
OceanStore is a utility infrastructure designed to span the globe and provide continuous access to persistent information. Since this infrastructure is comprised of untrusted se...
Separating key management from file system security
No secure network file system has ever grown to span the Internet. Existing systems all lack adequate key management for security at a global scale. Given the diversity of the I...
Publication Info
- Year
- 1997
- Type
- article
- Volume
- 78
- Issue
- 11
- Pages
- 2256-2259
- Citations
- 126
- Access
- Closed
External Links
Social Impact
Social media, news, blog, policy document mentions
Citation Metrics
Cite This
Identifiers
- DOI
- 10.1103/physrevlett.78.2256