Cryptography ◽  
2020 ◽  
Vol 4 (3) ◽  
pp. 24
Author(s):  
Noah Cowper ◽  
Harry Shaw ◽  
David Thayer

The ability to send information securely is a vital aspect of today’s society, and with the developments in quantum computing, new ways to communicate have to be researched. We explored a novel application of quantum key distribution (QKD) and synchronized chaos which was utilized to mask a transmitted message. This communication scheme is not hampered by the ability to send single photons and consequently is not vulnerable to number splitting attacks like other QKD schemes that rely on single photon emission. This was shown by an eavesdropper gaining a maximum amount of information on the key during the first setup and listening to the key reconciliation to gain more information. We proved that there is a maximum amount of information an eavesdropper can gain during the communication, and this is insufficient to decode the message.


Quantum ◽  
2018 ◽  
Vol 2 ◽  
pp. 111 ◽  
Author(s):  
Frédéric Bouchard ◽  
Khabat Heshami ◽  
Duncan England ◽  
Robert Fickler ◽  
Robert W. Boyd ◽  
...  

Quantum key distribution is on the verge of real world applications, where perfectly secure information can be distributed among multiple parties. Several quantum cryptographic protocols have been theoretically proposed and independently realized in different experimental conditions. Here, we develop an experimental platform based on high-dimensional orbital angular momentum states of single photons that enables implementation of multiple quantum key distribution protocols with a single experimental apparatus. Our versatile approach allows us to experimentally survey different classes of quantum key distribution techniques, such as the 1984 Bennett & Brassard (BB84), tomographic protocols including the six-state and the Singapore protocol, and to investigate, for the first time, a recently introduced differential phase shift (Chau15) protocol using twisted photons. This enables us to experimentally compare the performance of these techniques and discuss their benefits and deficiencies in terms of noise tolerance in different dimensions.


2019 ◽  
Vol 531 (8) ◽  
pp. 1800347 ◽  
Author(s):  
Po‐Hua Lin ◽  
Chia‐Wei Tsai ◽  
Tzonelih Hwang

2006 ◽  
Vol 35 (1) ◽  
pp. 31-36 ◽  
Author(s):  
V. L. Kurochkin ◽  
I. I. Ryabtsev ◽  
I. G. Neizvestny

2019 ◽  
Vol 61 (2) ◽  
pp. 759-775 ◽  
Author(s):  
Hao Xiao ◽  
Jun Zhang ◽  
Wen-Hua Huang ◽  
Mi Zhou ◽  
Wen-Cheng Hu

Author(s):  
D. B. Horoshko ◽  
S. Ya. Kilin

We consider an unambiguous state discrimination attack on the B92 protocol of quantum key distribution, realized on the basis of polarization encoding of photons produced by a single-photon source. We calculate the secure key rate and the maximal tolerable loss for various overlaps between two signal states employed in this protocol. We make also a comparison with a physically impossible attack of perfect quantum cloning, and show that the unambiguous state discrimination is much more dangerous for the B92 protocol, than this attack, demonstrating thus, that the security of quantum key distribution is not always based on the no-cloning theorem.


2005 ◽  
Vol 72 (5) ◽  
Author(s):  
Jérôme Lodewyck ◽  
Thierry Debuisschert ◽  
Rosa Tualle-Brouri ◽  
Philippe Grangier

Sign in / Sign up

Export Citation Format

Share Document