Access the full text.
Sign up today, get DeepDyve free for 14 days.
WE Ryan, S Lin (2009)
Channel Codes
S Zhang, J Wang, CJ Tang (2012)
Security proof of counterfactual quantum cryptography against general intercept-resend attacks and its vulnerabilityChin. Phys. B, 21
WY Hwang (2003)
Quantum key distribution with high loss: toward global secure communicationPhys. Rev. Lett., 91
V Makarov, A Anisimov, J Skaar (2006)
Effects of detector efficiency mismatch on security of quantum cryptosystemsPhys. Rev. A, 74
G Brida, A Cavanna, IP Degiovanni, M Genovese, P Traina (2012)
Experimental realization of counterfactual quantum cryptographyLaser Phys. Lett., 9
HK Lo, HF Chau (1999)
Unconditional security of quantum key distribution over arbitrarily long distancesScience, 283
HK Lo, M Curty, B Qi (2012)
Measurement-device-independent quantum key distributionPhys. Rev. Lett., 108
G Assche (2006)
Quantum Cryptography and Secret-Key Distillation
ZQ Yin, HW Li, Y Yao, CM Zhang, S Wang, W Chen, GC Guo, ZF Han (2012)
Counterfactual quantum cryptography based on weak coherent statesPhys. Rev. A, 86
G Brassard, N Lütkenhaus, T Mor, BC Sanders (2000)
Limitations on practical quantum cryptographyPhys. Rev. Lett., 85
ZQ Yin, HW Li, W Chen, ZF Han, GC Guo (2010)
Security of counterfactual quantum cryptographyPhy. Rev. A, 82
Y Liu, L Ju, XL Liang, SB Tang, GL Shen Tu, L Zhou, CZ Peng, K Chen, TY Chen, ZB Chen, JW Pan (2012)
Experimental demonstration of counterfactual quantum communicationPhys. Rev. Lett., 109
M Tomamichel, CCW Lim, N Gisin, R Renner (2012)
Tight finite-key analysis for quantum cryptographyNat. Commun., 3
Y Sun, QY Wen (2010)
Counterfactual quantum key distribution with high efficiencyPhys. Rev. A, 82
V Scarani, H Bechmann-Pasquinucci, NJ Cerf, M Dušek, N Lütkenhaus, M Peev (2009)
The security of practical quantum key distributionRev. Mod. Phys., 81
M Ren, G Wu, E Wu, H Zeng (2011)
Experimental demonstration of counterfactual quantum key distributionLaser Phys., 21
S Abruzzo, S Bratzik, NK Bernardes, H Kampermann, P vanLoock, D Bruß (2013)
Quantum repeaters and quantum key distribution: analysis of secret-key ratesPhys. Rev. A, 87
B Huttner, N Imoto, N Gisin, T Mor (1995)
Quantum cryptography with coherent statesPhys. Rev. A, 51
TG Noh (2009)
Counterfactual quantum cryptographyPhys. Rev. Lett., 103
CH Bennett (1992)
Quantum cryptography using any two nonorthogonal statesPhys. Rev. Lett., 68
N Lütkenhaus (1999)
Estimates for practical quantum cryptographyPhys. Rev. Lett., 59
N Gisin, S Fasel, B Kraus, H Zbinden, G Ribordy (2006)
Trojan-horse attacks on quantum-key-distribution systemsPhys. Rev. A, 73
Counterfactual quantum key distribution is an interesting direction in quantum cryptography and has been realized by some researchers. However, it has been pointed that its insecure in information theory when it is used over a high lossy channel. In this paper, we retry its security from a error-correcting theory point of view. The analysis indicates that the security flaw comes from the reason that the error rate in the users’ raw key pair is as high as that under the Eve’s attack when the loss rate exceeds 50 %.
Quantum Information Processing – Springer Journals
Published: Jul 15, 2014
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.