Security of counterfactual quantum cryptography

Zhen-Qiang Yin, Hong-Wei Li, Wei Chen, Zheng-Fu Han, and Guang-Can Guo
Phys. Rev. A 82, 042335 – Published 27 October 2010

Abstract

Recently, a “counterfactual” quantum-key-distribution scheme was proposed by T.-G. Noh [Phys. Rev. Lett. 103, 230501 (2009)]. In this scheme, two legitimate distant peers may share secret keys even when the information carriers are not traveled in the quantum channel. We find that this protocol is equivalent to an entanglement distillation protocol. According to this equivalence, a strict security proof and the asymptotic key bit rate are both obtained when a perfect single-photon source is applied and a Trojan horse attack can be detected. We also find that the security of this scheme is strongly related to not only the bit error rate but also the yields of photons. And our security proof may shed light on the security of other two-way protocols.

  • Figure
  • Received 10 May 2010

DOI:https://doi.org/10.1103/PhysRevA.82.042335

©2010 American Physical Society

Authors & Affiliations

Zhen-Qiang Yin, Hong-Wei Li, Wei Chen, Zheng-Fu Han*, and Guang-Can Guo

  • Key Laboratory of Quantum Information, University of Science and Technology of China, Hefei 230026, China

  • *zfhan@ustc.edu.cn

Article Text (Subscription Required)

Click to Expand

References (Subscription Required)

Click to Expand
Issue

Vol. 82, Iss. 4 — October 2010

Reuse & Permissions
Access Options
Author publication services for translation and copyediting assistance advertisement

Authorization Required


×
×

Images

×

Sign up to receive regular email alerts from Physical Review A

Log In

Cancel
×

Search


Article Lookup

Paste a citation or DOI

Enter a citation
×