pith. machine review for the scientific record. sign in

arxiv: quant-ph/0411022 · v1 · submitted 2004-11-03 · 🪐 quant-ph

Recognition: unknown

Towards practical and fast Quantum Cryptography

Authors on Pith no claims yet
classification 🪐 quant-ph
keywords attackslineprotocolpulsesquantumcoherentcryptographymonitoring
0
0 comments X
read the original abstract

We present a new protocol for practical quantum cryptography, tailored for an implementation with weak coherent pulses. The key is obtained by a very simple time-of-arrival measurement on the data line; an interferometer is built on an additional monitoring line, allowing to monitor the presence of a spy (who would break coherence by her intervention). Against zero-error attacks (the analog of photon-number-splitting attacks), this protocol performs as well as standard protocols with strong reference pulses: the key rate decreases only as the transmission $t$ of the quantum channel. We present also two attacks that introduce errors on the monitoring line: the intercept-resend, and a coherent attack on two subsequent pulses. Finally, we sketch several possible variations of this protocol.

This paper has not been read by Pith yet.

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.