2016
DOI: 10.3389/fphy.2016.00016
|View full text |Cite
|
Sign up to set email alerts
|

Quantum Erasure Cryptography

Abstract: The phenomenon of quantum erasure has long intrigued physicists, but has surprisingly found limited practical application. Here, we propose a protocol for quantum key distribution (QKD) based on quantum erasure, promising inherent security against detector attacks. We particularly demonstrate its security against a powerful detector-blinding attack.

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
8
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
3
2

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(8 citation statements)
references
References 10 publications
0
8
0
Order By: Relevance
“…Let us consider a general QKD protocol (based on a scheme proposed in ref. [110]) where a secret key can be distributed by means of the measurements of the momentum of the transmitted particle without observing the polarization. Also this scheme can be considered an improvement of BB84 but the fact of performing only one measurement allows a more simple physical implementation w.r.t.…”
Section: Momentum-measurement Protocolmentioning
confidence: 99%
See 2 more Smart Citations
“…Let us consider a general QKD protocol (based on a scheme proposed in ref. [110]) where a secret key can be distributed by means of the measurements of the momentum of the transmitted particle without observing the polarization. Also this scheme can be considered an improvement of BB84 but the fact of performing only one measurement allows a more simple physical implementation w.r.t.…”
Section: Momentum-measurement Protocolmentioning
confidence: 99%
“…Since the other separable state false|normalΨ1false⟩ is ruled out, if Eve re‐sends the state false|normalΨ0false⟩, then she transmits the correct state to Bob with probability 12. Assuming Eve intercepts every transmitted particle, she introduces the error rate e=13 in the sifted key [ 110 ] that is greater than the error rate of 14 for BB84 under a standard intercept‐and‐resend attack. Moreover, the protocol turns out to be robust under a detector‐blinding attack [ 110 ] where Eve is able to blind Bob's measurement device.…”
Section: Single‐particle Entanglement For Quantum Information Applicamentioning
confidence: 99%
See 1 more Smart Citation
“…Practically, quantum erasure has been used to entangle, for the first time, two different-colour photons [ 7 ], and more recently, to propose a new protocol for quantum key distribution (QKD) that promises inherent security against detector-targeting attacks [ 8 ].…”
mentioning
confidence: 99%
“…Erasing which-path information, even long after the particles have been detected, remarkably restores interference, seemingly allowing one to alter the past [4][5][6]. What is actually altered, however, is what one can say about the pastan argument for Bohr's view of physics as not being about what the world is, but rather what can be said about the world.Practically, quantum erasure has been used to entangle, for the first time, two different-colour photons [7], and more recently, to propose a new protocol for quantum key distribution (QKD) that promises inherent security against detector-targeting attacks [8].Counterfactuality, on the other hand, gleans information from events that could have happened but did not in fact take place.…”
mentioning
confidence: 99%