期刊文献+

Security proof of counterfactual quantum cryptography against general intercept-resend attacks and its vulnerability 被引量:3

Security proof of counterfactual quantum cryptography against general intercept-resend attacks and its vulnerability
下载PDF
导出
摘要 Counterfactual quantum cryptography, recently proposed by Noh, is featured with no transmission of signal parti- cles. This exhibits evident security advantages, such as its immunity to the well-known photon-number-splitting attack. In this paper, the theoretical security of counterfactual quantum cryptography protocol against the general intercept- resend attacks is proved by bounding the information of an eavesdropper Eve more tightly than in Yin's proposal [Phys. Rev. A 82 042335 (2010)]. It is also shown that practical counterfactual quantum cryptography implementations may be vulnerable when equipped with imperfect apparatuses, by proving that a negative key rate can be achieved when Eve launches a time-shift attack based on imperfect detector efficiency. Counterfactual quantum cryptography, recently proposed by Noh, is featured with no transmission of signal parti- cles. This exhibits evident security advantages, such as its immunity to the well-known photon-number-splitting attack. In this paper, the theoretical security of counterfactual quantum cryptography protocol against the general intercept- resend attacks is proved by bounding the information of an eavesdropper Eve more tightly than in Yin's proposal [Phys. Rev. A 82 042335 (2010)]. It is also shown that practical counterfactual quantum cryptography implementations may be vulnerable when equipped with imperfect apparatuses, by proving that a negative key rate can be achieved when Eve launches a time-shift attack based on imperfect detector efficiency.
出处 《Chinese Physics B》 SCIE EI CAS CSCD 2012年第6期33-40,共8页 中国物理B(英文版)
基金 Project supported by the National Natural Science Foundation of China (Grant No 60872052)
关键词 quantum cryptography quantum counterfactuality quantum information quantum cryptography, quantum counterfactuality, quantum information
  • 相关文献

参考文献19

  • 1Bennett C H and Brassard G 1984 Proceedings of IEEE International Conference on Computers, Systems andSignal Processing, December 9-12, 1984, Bangalore, In- dia, p. 175.
  • 2Ekert A K 1991 Phys. Rew Lett. 67 661.
  • 3Gisin N, Ribordy G, Tittel W and Zbinden H 2002 Rev. Mod. Phys. 74 145.
  • 4Gottesman D, Lo H K, Liitkenhaus N and Preskill J 2004 Quantum Infor. Comput. 4 325.
  • 5Stucki D, Gisin N, Guinnrd O, Robordy G and Zbinden H 2002 New J. Phys. 4 41.
  • 6Zhao Y, Qi B, Ma X, Lo H K and Qian L 2006 Phys. Rev. Lett. 96 070502.
  • 7Zhao Y, Qi B, Ma X, Lo H K and Qian L 2006 Proceedings of IEEE International Symposium of Information Theory July 9-14, 2006, Seattle, Washington, USA p. 2094.
  • 8Elliot C, Pearson D and Troxel G 2003 Proceeding of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications August 25- 29, 2003, Karlsruhe, Germany p. 227.
  • 9Zhao Y, Qi B, Ma X, Lo H K and Qian L 2006 Phys. Rev. Lett. 96070502.
  • 10Xu F X, Chen W, Wang S, Yin Z Q, Zhang Y, Liu Y, Zhou Z, Zhao Y B, Li H W, Liu D, Han Z F and Guo G C 2008 Chin. Sci. Bull. 54 2991.

同被引文献1

引证文献3

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部