2018
DOI: 10.1007/s11128-018-1974-y
|View full text |Cite
|
Sign up to set email alerts
|

Decoherence can help quantum cryptographic security

Abstract: In quantum key distribution, one conservatively assumes that the eavesdropper Eve is restricted only by physical laws, whereas the legitimate parties, namely the sender Alice and receiver Bob, are subject to realistic constraints, such as noise due to environment-induced decoherence. In practice, Eve too may be bound by the limits imposed by noise, which can give rise to the possibility that decoherence works to the advantage of the legitimate parties. A particular scenario of this type is one where Eve can't … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
7
3

Relationship

5
5

Authors

Journals

citations
Cited by 19 publications
(8 citation statements)
references
References 56 publications
0
8
0
Order By: Relevance
“…In a quantum setting, binary classification was discussed in terms of Grover's search in [21] and using the adiabatic algorithm in [22][23][24][25]. Quantum learning was also elaborated in [2,26,27].…”
Section: Quantum Support Vector Machinementioning
confidence: 99%
“…In a quantum setting, binary classification was discussed in terms of Grover's search in [21] and using the adiabatic algorithm in [22][23][24][25]. Quantum learning was also elaborated in [2,26,27].…”
Section: Quantum Support Vector Machinementioning
confidence: 99%
“…Note that although in the original ping-pong protocol QBER is not monitored in the message mode, yet in principle it is detectable, and is indeed monitored in the adaptation for the ping-pong protocol for QKD [29,30].…”
Section: Contrast With Attack On Ping-pong Protocolmentioning
confidence: 99%
“…With a breakdown of condition (b), the intermediate map is non-CP (NCP), essentially because the system-bath interaction generates system-bath entanglement. With the advancement of technology, one is now able to experimentally go beyond Markovian phenomena and enter into the non-Markovian regime [7,[10][11][12][13][14][15][16].…”
Section: Introductionmentioning
confidence: 99%