1,136 research outputs found
Quantum authentication of classical messages
Although key distribution is arguably the most studied context on which to
apply quantum cryptographic techniques, message authentication, i.e.,
certifying the identity of the message originator and the integrity of the
message sent, can also benefit from the use of quantum resources. Classically,
message authentication can be performed by techniques based on hash functions.
However, the security of the resulting protocols depends on the selection of
appropriate hash functions, and on the use of long authentication keys. In this
paper we propose a quantum authentication procedure that, making use of just
one qubit as the authentication key, allows the authentication of binary
classical messages in a secure manner.Comment: LaTeX, 6 page
Long-distance device-independent quantum key distribution
Besides being a beautiful idea, device-independent quantum key distribution
(DIQKD) is probably the ultimate solution to defeat quantum hacking. To
guarantee security, it requires, however, that the fair-sampling loophole is
closed, which results in a very limited maximum achievable distance. To
overcome this limitation, DIQKD must be furnished with fair-sampling devices
like, for instance, qubit amplifiers. These devices can herald the arrival of a
photon to the receiver and thus decouple channel loss from the selection of the
measurement settings. Consequently, one can safely postselect the heralded
events and discard the rest, which results in a significant enhancement of the
achievable distance. In this work, we investigate photonic-based DIQKD assisted
by two main types of qubit amplifiers in the finite data block size scenario,
and study the resources -- particularly, the detection efficiency of the
photodetectors and the quality of the entanglement sources -- that would be
necessary to achieve long-distance DIQKD within a reasonable time frame of
signal transmission.Comment: 37 pages, 15 figure
Secure Quantum Key Distribution
Secure communication plays a crucial role in the Internet Age. Quantum
mechanics may revolutionise cryptography as we know it today. In this Review
Article, we introduce the motivation and the current state of the art of
research in quantum cryptography. In particular, we discuss the present
security model together with its assumptions, strengths and weaknesses. After a
brief introduction to recent experimental progress and challenges, we survey
the latest developments in quantum hacking and counter-measures against it.Comment: 13 pages, 5 figure
- …
