Quantum teleportation for keyless cryptography

作者: Abhishek Parakh

DOI: 10.1117/12.2177509

关键词: CryptographyQuantum teleportationTeleportationEncryptionSARG04Computer scienceQubitBB84Key distributionNo-teleportation theoremQuantum networkQuantum entanglementQuantum channelTheoretical computer scienceSuperdense codingQuantum cryptography

摘要: This paper looks at using quantum teleportation for secure message exchange. Although the proposed protocol has parallels with Ekert’s key distribution, we look issue of directly teleporting bits instead encryption keys. Further, it is first it’s type where role sender and receiver are flipped around. In other words, unlike traditional protocols, in performs certain measurements thus implicitly determining a stream that she combines bit received from to determine secret message. There no qubits wasted random measurements.

参考文章(9)
Hoi-Kwong Lo, Hoi Fung Chau, Unconditional Security of Quantum Key Distribution over Arbitrarily Long Distances Science. ,vol. 283, pp. 2050- 2056 ,(1999) , 10.1126/SCIENCE.283.5410.2050
Renato Renner, Nicolas Gisin, Barbara Kraus, Information-theoretic security proof for quantum-key-distribution protocols Physical Review A. ,vol. 72, pp. 012332- ,(2005) , 10.1103/PHYSREVA.72.012332
Jonathan Barrett, Lucien Hardy, Adrian Kent, No signaling and quantum key distribution. Physical Review Letters. ,vol. 95, pp. 010503- ,(2005) , 10.1103/PHYSREVLETT.95.010503
Lars Lydersen, Carlos Wiechers, Christoffer Wittmann, Dominique Elser, Johannes Skaar, Vadim Makarov, Hacking commercial quantum cryptography systems by tailored bright illumination Nature Photonics. ,vol. 4, pp. 686- 689 ,(2010) , 10.1038/NPHOTON.2010.214
Antonio Acín, Nicolas Brunner, Nicolas Gisin, Serge Massar, Stefano Pironio, Valerio Scarani, Device-independent security of quantum cryptography against collective attacks. Physical Review Letters. ,vol. 98, pp. 230501- ,(2007) , 10.1103/PHYSREVLETT.98.230501
Artur K. Ekert, Quantum cryptography based on Bell’s theorem Physical Review Letters. ,vol. 67, pp. 661- 663 ,(1991) , 10.1103/PHYSREVLETT.67.661
Peter W. Shor, John Preskill, Simple proof of security of the BB84 quantum key distribution protocol Physical Review Letters. ,vol. 85, pp. 441- 444 ,(2000) , 10.1103/PHYSREVLETT.85.441
Whitfield Diffie, Martin E Hellman, None, New Directions in Cryptography IEEE Transactions on Information Theory. ,vol. 22, pp. 644- 654 ,(1976) , 10.1109/TIT.1976.1055638
R. L. Rivest, A. Shamir, L. Adleman, A method for obtaining digital signatures and public-key cryptosystems Communications of the ACM. ,vol. 21, pp. 120- 126 ,(1978) , 10.1145/359340.359342