메뉴 건너뛰기




Volumn 18, Issue 2, 2005, Pages 133-165

Efficient quantum key distribution scheme and a proof of its unconditional security

Author keywords

Key distribution; Quantum computing; Quantum cryptography; Quantum information

Indexed keywords

DATA PRIVACY; DATA REDUCTION; PUBLIC KEY CRYPTOGRAPHY; QUANTUM THEORY; SECURITY OF DATA; THEOREM PROVING;

EID: 17444398022     PISSN: 09332790     EISSN: None     Source Type: Journal    
DOI: 10.1007/s00145-004-0142-y     Document Type: Article
Times cited : (535)

References (63)
  • 1
    • 0036756894 scopus 로고    scopus 로고
    • Security proof of quantum cryptography based entirely on entanglement purification
    • H. Aschauer and H. J. Briegel, Security proof of quantum cryptography based entirely on entanglement purification, Phys. Rev. A, vol. 66 (2002) 032302.
    • (2002) Phys. Rev. A , vol.66 , pp. 032302
    • Aschauer, H.1    Briegel, H.J.2
  • 2
    • 11944254075 scopus 로고
    • Quantum cryptography using any two nonorthogonal states
    • C. H. Bennett, Quantum cryptography using any two nonorthogonal states, Phys. Rev. Lett., vol. 68 (1992), pp. 3121-3124.
    • (1992) Phys. Rev. Lett. , vol.68 , pp. 3121-3124
    • Bennett, C.H.1
  • 7
    • 11944263767 scopus 로고
    • Quantum cryptography without Bell's theorem
    • C. H. Bennett, G. Brassard, and N. D. Mermin, Quantum cryptography without Bell's theorem, Phys. Rev. Lett., vol. 68 ( 1992). pp. 557-559.
    • (1992) Phys. Rev. Lett. , vol.68 , pp. 557-559
    • Bennett, C.H.1    Brassard, G.2    Mermin, N.D.3
  • 11
    • 84928045174 scopus 로고    scopus 로고
    • Quantum cryptographic network based on quantum memories
    • E. Biham, B. Huttner, and T. Mor, Quantum cryptographic network based on quantum memories, Phys. Rev. A, vol. 54 (1996), pp. 2651-2658.
    • (1996) Phys. Rev. A , vol.54 , pp. 2651-2658
    • Biham, E.1    Huttner, B.2    Mor, T.3
  • 13
    • 11544350211 scopus 로고    scopus 로고
    • Optimal eavesdropping in quantum cryptography with six states
    • D. Bruss, Optimal eavesdropping in quantum cryptography with six states, Phys. Rev. Lett., vol. 81 (1998), pp. 3018-3021.
    • (1998) Phys. Rev. Lett. , vol.81 , pp. 3018-3021
    • Bruss, D.1
  • 15
    • 0001398327 scopus 로고    scopus 로고
    • Good quantum error correcting codes exist
    • A. R. Calderbank and P. Shor, Good quantum error correcting codes exist, Phys. Rev. A, vol. 54 ( 1996), 1098-1105.
    • Phys. Rev. A , vol.54 , Issue.1996 , pp. 1098-1105
    • Calderbank, A.R.1    Shor, P.2
  • 17
    • 0032325993 scopus 로고    scopus 로고
    • Making an empty promise with a quantum computer
    • H. F. Chau and H.-K. Lo, Making an empty promise with a quantum computer. Fortschr. Phys., vol. 56 (1998), pp. 507-519.
    • (1998) Fortschr. Phys. , vol.56 , pp. 507-519
    • Chau, H.F.1    Lo, H.-K.2
  • 19
    • 33750978344 scopus 로고
    • Communication by EPR devices
    • D. Dieks, Communication by EPR devices, Phys. Lett. A, vol. 92 (1982), pp. 271-273.
    • (1982) Phys. Lett. A , vol.92 , pp. 271-273
    • Dieks, D.1
  • 20
    • 0017018484 scopus 로고
    • New directions in cryptography
    • W. Diffie and M. E. Hellman, New directions in cryptography, IEEE Trans. Inform. Theory, vol. IT-22, no. 6 (1976), pp. 644-654.
    • (1976) IEEE Trans. Inform. Theory , vol.IT-22 , Issue.6 , pp. 644-654
    • Diffie, W.1    Hellman, M.E.2
  • 21
    • 0343152990 scopus 로고
    • Qauntum cryptography based on Bell's theorem
    • A. K. Ekert, Qauntum cryptography based on Bell's theorem, Phys. Rev. Lett., vol. 67 (1991), pp. 661-663.
    • (1991) Phys. Rev. Lett. , vol.67 , pp. 661-663
    • Ekert, A.K.1
  • 22
    • 0000004338 scopus 로고
    • Quantum cryptography based on orthogonal states
    • L. Goldenberg and L. Vaidman, Quantum cryptography based on orthogonal states, Phys. Rev. Lett., vol. 75 (1995), pp. 1239-1243.
    • (1995) Phys. Rev. Lett. , vol.75 , pp. 1239-1243
    • Goldenberg, L.1    Vaidman, L.2
  • 23
    • 0000132422 scopus 로고    scopus 로고
    • A class of quantum error-correcting codes saturating the quantum Hamming bound
    • D. Gottesman, A class of quantum error-correcting codes saturating the quantum Hamming bound, Phys. Rev. A, vol. 54 (1996), pp. 1862-1868.
    • (1996) Phys. Rev. A , vol.54 , pp. 1862-1868
    • Gottesman, D.1
  • 25
    • 0001872185 scopus 로고    scopus 로고
    • From quantum cheating to quantum security
    • D. Gottesman and H.-K. Lo, From quantum cheating to quantum security, Phys. Today, vol. 53. no. 11 (2000), pp. 22-27, also available at http://www.physicstoday.org/pt/vol-53/iss-11/p22.html.
    • (2000) Phys. Today , vol.53 , Issue.11 , pp. 22-27
    • Gottesman, D.1    Lo, H.-K.2
  • 26
    • 0037319628 scopus 로고    scopus 로고
    • Proof of security of quantum key distribution with two-way classical communications
    • D. Gottesman and H.-K. Lo, Proof of security of quantum key distribution with two-way classical communications, IEEE Trans. Inform. Theory, vol. 49, no. 2 (2003), pp. 457-475; also available at http://xxx.lanl.gov/abs/quant-ph/ 0105121.
    • (2003) IEEE Trans. Inform. Theory , vol.49 , Issue.2 , pp. 457-475
    • Gottesman, D.1    Lo, H.-K.2
  • 28
    • 0141771056 scopus 로고    scopus 로고
    • Secure quantum key distribution using squeezed states
    • D. Gottesman and J. Preskill, Secure quantum key distribution using squeezed states, Phys. Rev. A, vol. 63 (2001) 022309; also available at http://xxx.lanl.gov/abs/quant-ph/0008046.
    • (2001) Phys. Rev. A , vol.63 , pp. 022309
    • Gottesman, D.1    Preskill, J.2
  • 29
    • 0038587554 scopus 로고
    • Capacity of a quantum communications channel
    • A. S. Holevo, Capacity of a quantum communications channel, Problems Inform. Transmission, vol. 9 (1973), p. 117.
    • (1973) Problems Inform. Transmission , vol.9 , pp. 117
    • Holevo, A.S.1
  • 30
    • 0034652057 scopus 로고    scopus 로고
    • Quantum key distribution over a 48 km optical fibre network
    • R. J. Hughes, G. L. Morgan, and C. G. Peterson, Quantum key distribution over a 48 km optical fibre network, J. Mod. Opt., vol. 47 (2000), pp. 533-548.
    • (2000) J. Mod. Opt. , vol.47 , pp. 533-548
    • Hughes, R.J.1    Morgan, G.L.2    Peterson, C.G.3
  • 34
    • 0013056114 scopus 로고    scopus 로고
    • Quantum cryptography in free space
    • B. C. Jacobs and J. D. Franson, Quantum cryptography in free space, Opt. Lett., vol. 21 (1996), pp. 1854-1856.
    • (1996) Opt. Lett. , vol.21 , pp. 1854-1856
    • Jacobs, B.C.1    Franson, J.D.2
  • 36
    • 0001532069 scopus 로고    scopus 로고
    • Quantum cryptography based on split transmission of one-bit
    • M. Koashi and N. Imoto, Quantum cryptography based on split transmission of one-bit, Phys. Rev. Lett., vol. 79 (1997), pp. 2383-2386.
    • (1997) Phys. Rev. Lett. , vol.79 , pp. 2383-2386
    • Koashi, M.1    Imoto, N.2
  • 37
    • 17444415101 scopus 로고    scopus 로고
    • Private communications
    • S. M. S. Lee, Private communications.
    • Lee, S.M.S.1
  • 38
    • 0001236013 scopus 로고    scopus 로고
    • Insecurity of quantum secure computaions
    • H.-K. Lo, Insecurity of quantum secure computaions, Phys. Rev. A, vol. 56 (1997). pp. 1154-1162.
    • (1997) Phys. Rev. A , vol.56 , pp. 1154-1162
    • Lo, H.-K.1
  • 39
    • 0035823463 scopus 로고    scopus 로고
    • A simple proof of the unconditional security of quantum key distribution
    • H.-K. Lo, A simple proof of the unconditional security of quantum key distribution, J. Phys. A, vol. 34 (2001), 6957; also available at http://xxx.lanl.gov/abs/quant-ph/9904091.
    • (2001) J. Phys. A , vol.34 , pp. 6957
    • Lo, H.-K.1
  • 40
    • 0013207242 scopus 로고    scopus 로고
    • Proof of unconditional security of six-state quantum key distribution scheme
    • H.-K. Lo, Proof of unconditional security of six-state quantum key distribution scheme, QIC, vol. 1, no. 2 (2001), pp. 81-94.
    • (2001) QIC , vol.1 , Issue.2 , pp. 81-94
    • Lo, H.-K.1
  • 41
    • 0001260566 scopus 로고    scopus 로고
    • Is quantum bit commitment really possible?
    • H.-K. Lo and H. F. Chau, Is quantum bit commitment really possible?, Phys. Rev. Lett., vol. 78 (1997), pp. 3410-3413; also available at http://xxx.lanl.gov/abs/quant-ph/9603004.
    • (1997) Phys. Rev. Lett. , vol.78 , pp. 3410-3413
    • Lo, H.-K.1    Chau, H.F.2
  • 42
    • 0001731260 scopus 로고    scopus 로고
    • Why quantum bit commitment and ideal quantum coin tossing are impossible
    • H.-K. Lo and H. F. Chau, Why quantum bit commitment and ideal quantum coin tossing are impossible, Phys. D, vol. 120 (1998), pp. 177-187; also available at http://xxx.lanl.gov/abs/quant-ph/9605026.
    • (1998) Phys. D , vol.120 , pp. 177-187
    • Lo, H.-K.1    Chau, H.F.2
  • 43
    • 17444412036 scopus 로고    scopus 로고
    • Quantum Cryptographic System with Reduced Data Loss, U.S. Patent Number 5,732,139 (March 24)
    • H.-K. Lo and H. F. Chau, Quantum Cryptographic System with Reduced Data Loss, U.S. Patent Number 5,732,139 (March 24, 1998).
    • (1998)
    • Lo, H.-K.1    Chau, H.F.2
  • 44
    • 0033605546 scopus 로고    scopus 로고
    • Unconditional security of quantum key distribution over arbitrarily long distances
    • H.-K. Lo and H. F. Chau, Unconditional security of quantum key distribution over arbitrarily long distances, Science, vol. 283 (1999), pp. 2050-2056; also available at http://xxx.lanl.gov/abs/quantph/9803006.
    • (1999) Science , vol.283 , pp. 2050-2056
    • Lo, H.-K.1    Chau, H.F.2
  • 47
    • 0033099611 scopus 로고    scopus 로고
    • Good error-correcting codes based on very sparse matrices
    • D. J. C. MacKay, Good error-correcting codes based on very sparse matrices, IEEE Trans. Inform. Theory, vol. 45, no. 2 (1999), pp. 399-431.
    • (1999) IEEE Trans. Inform. Theory , vol.45 , Issue.2 , pp. 399-431
    • MacKay, D.J.C.1
  • 48
    • 0001336918 scopus 로고    scopus 로고
    • Uncoditionally secure quantum bit commitment is impossible
    • D. Mayers, Uncoditionally secure quantum bit commitment is impossible, Phys. Rev. Lett., vol. 78 (1997), pp. 3414-3417.
    • (1997) Phys. Rev. Lett. , vol.78 , pp. 3414-3417
    • Mayers, D.1
  • 49
    • 3042730516 scopus 로고    scopus 로고
    • Unconditional security in quantum cryptography
    • D. Mayers, Unconditional security in quantum cryptography, J. Assoc. Comput. Mach., vol. 48, no. 3 (2001), pp. 351-406. A preliminary version in D. Mayers, Quantum key distribution and string oblivious transfer in noisy channel, Advances in Cryptology - Proceedings of Crypto' 96, Lecture Notes in Computer Science, vol. 1109, Springer-Verlag, Berlin, 1996, pp. 343-357.
    • (2001) J. Assoc. Comput. Mach. , vol.48 , Issue.3 , pp. 351-406
    • Mayers, D.1
  • 50
    • 84955621476 scopus 로고    scopus 로고
    • Quantum key distribution and string oblivious transfer in noisy channel
    • A preliminary version Lecture Notes in Computer Science, Springer-Verlag, Berlin
    • D. Mayers, Unconditional security in quantum cryptography, J. Assoc. Comput. Mach., vol. 48, no. 3 (2001), pp. 351-406. A preliminary version in D. Mayers, Quantum key distribution and string oblivious transfer in noisy channel, Advances in Cryptology - Proceedings of Crypto' 96, Lecture Notes in Computer Science, vol. 1109, Springer-Verlag, Berlin, 1996, pp. 343-357.
    • (1996) Advances in Cryptology - Proceedings of Crypto' 96 , vol.1109 , pp. 343-357
    • Mayers, D.1
  • 51
    • 33750021221 scopus 로고
    • Underwater quantum coding
    • A. Muller, H. Zbinden, and N. Gisin, Underwater quantum coding, Nature, vol. 378 (1995). pp. 449-449.
    • (1995) Nature , vol.378 , pp. 449-449
    • Muller, A.1    Zbinden, H.2    Gisin, N.3
  • 52
    • 17444418785 scopus 로고    scopus 로고
    • Private communications
    • J. Renes, Private communications.
    • Renes, J.1
  • 53
    • 0004221065 scopus 로고
    • Spinger-Verlag, Berlin, equation (1.2.5)
    • S. Roman, Coding and Information Theory, Spinger-Verlag, Berlin, 1992, equation (1.2.5) on p. 26.
    • (1992) Coding and Information Theory , pp. 26
    • Roman, S.1
  • 54
    • 85115374351 scopus 로고
    • Algorithms for quantum computation: Discrete logarithms and factoring
    • IEEE Press, Piscataway, NJ
    • P. Shor, Algorithms for quantum computation: discrete logarithms and factoring, Proceedings 35th Annual Symposium on Foundations of Computer Science, IEEE Press, Piscataway, NJ, 1994, pp. 124-134.
    • (1994) Proceedings 35th Annual Symposium on Foundations of Computer Science , pp. 124-134
    • Shor, P.1
  • 55
    • 0142051871 scopus 로고    scopus 로고
    • Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer
    • P. Shor, Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer, SIAM J. Comput., vol. 26 (1997), pp. 1484-1509.
    • (1997) SIAM J. Comput. , vol.26 , pp. 1484-1509
    • Shor, P.1
  • 56
    • 0347090658 scopus 로고    scopus 로고
    • Simple proof of security of the BB84 quantum key distribution scheme
    • P. W. Shor and J. Preskill, Simple proof of security of the BB84 quantum key distribution scheme, Phys. Rev. Lett., vol. 85 (2000), pp. 441-444.
    • (2000) Phys. Rev. Lett. , vol.85 , pp. 441-444
    • Shor, P.W.1    Preskill, J.2
  • 57
    • 17444386471 scopus 로고
    • On approximation of hypergeometric distribution
    • R. Sródka, On approximation of hypergeometric distribution, Nauk. Politech. Lódikiej, vol. 10 (1963), pp. 5-17 as cited in Univariate Discrete Distributions, 2nd edn., N. L. Johnson, S. Kotz, and A. W. Kemp, eds., Wiley, New York, 1992, equation (6.70) on p. 256.
    • (1963) Nauk. Politech. Lódikiej , vol.10 , pp. 5-17
    • Sródka, R.1
  • 58
    • 0003763748 scopus 로고
    • Wiley, New York, equation (6.70)
    • R. Sródka, On approximation of hypergeometric distribution, Nauk. Politech. Lódikiej, vol. 10 (1963), pp. 5-17 as cited in Univariate Discrete Distributions, 2nd edn., N. L. Johnson, S. Kotz, and A. W. Kemp, eds., Wiley, New York, 1992, equation (6.70) on p. 256.
    • (1992) Univariate Discrete Distributions, 2nd Edn. , pp. 256
    • Johnson, N.L.1    Kotz, S.2    Kemp, A.W.3
  • 59
    • 0007244732 scopus 로고    scopus 로고
    • Multiple particle interference and error correction
    • A. M. Steane, Multiple particle interference and error correction, Proc. Roy. Sac. London Ser.A, vol. 452 (1996), pp. 2551-2577.
    • (1996) Proc. Roy. Sac. London Ser.A , vol.452 , pp. 2551-2577
    • Steane, A.M.1
  • 61
    • 0039498880 scopus 로고    scopus 로고
    • Quantum cryptography on optical fiber networks
    • P. Townsend, Quantum cryptography on optical fiber networks, Opt. Fiber Technol., vol. 4 (1998). pp. 345-370.
    • (1998) Opt. Fiber Technol. , vol.4 , pp. 345-370
    • Townsend, P.1
  • 62
    • 0001998264 scopus 로고
    • Conjugate coding
    • manuscript written in about 1970
    • S. Wiesner, Conjugate coding, Sigact News, vol. 15. no. 1 (1983). pp. 78-88, manuscript written in about 1970.
    • (1983) Sigact News , vol.15 , Issue.1 , pp. 78-88
    • Wiesner, S.1
  • 63
    • 33746708860 scopus 로고
    • A single quantum cannot be cloned
    • W. K. Wootters and W. Zurek. A single quantum cannot be cloned, Nature, vol. 299 (1982). pp. 802-803.
    • (1982) Nature , vol.299 , pp. 802-803
    • Wootters, W.K.1    Zurek, W.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.