Advertisement

Anonymous-Key Quantum Cryptography and Unconditionally Secure Quantum Bit Commitment

  • Horace P. Yuen

Abstract

A new cryptographic tool, anonymous quantum key technique, is introduced that leads to unconditionally secure key distribution and encryption schemes that can be readily implemented experimentally in a realistic environment. If quantum memory is available, the technique would have many features of public-key cryptography; an identification protocolthat does not require a shared secret key is provided as an illustration. The possibility is also indicated for obtaining unconditionally secure quantum bit commitment protocols with this technique.

Keywords

Quantum Communication Impersonation Attack Quantum Memory Security Proof Joint Attack 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [1]
    H. P. Yuen, “Unconditionally Secure Quantum Bit Commitment is Possible,” LANL quant-ph/0006109.Google Scholar
  2. [2]
    For a broad and thorough discussion of standard cryptography, see A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone, Handbook of Applied Cryptography, CRC Press, New York, 1997.zbMATHGoogle Scholar
  3. [3]
    But it was first published in S. Wiesner, SIGACT News 15 (1), 78 (1983).CrossRefzbMATHGoogle Scholar
  4. [4]
    C. H. Bennett and G. Brassard, in Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing, IEEE Press, New York, 1984; p. 175.Google Scholar
  5. [5]
    C. H. Bennett, F. Bessette, G. Brassard, L. Salvail, and J. Smolin, J. Cryptol. 5, 3(1992).CrossRefzbMATHGoogle Scholar
  6. [6]
    H.-K. Lo and H. F. Chau, Phys. Rev. Lett. 78, 3410 (1997); D. Mayers, ibid, p. 3414; H.-K. Lo, Phys. Rev A56, 1154(1997).CrossRefADSGoogle Scholar
  7. [8]
    Of course Eve cannot have such an identical copy from the no-clone theorem, W. K. Wooters and W. Zurek, Nature 299, 802 (1982), and H. P. Yuen, Phys. Lett. A 113, 405 (1986).ADSCrossRefGoogle Scholar
  8. [9]
    C.W. Helstrom, Quantum Detection and Estimation Theory, Academic Press, 1976, Ch. IV.Google Scholar
  9. [10]
    H. P. Yuen, R.S. Kennedy, and M. Lax, IEEE Trans. Inform. Theory 21, 125(1975).CrossRefMathSciNetzbMATHGoogle Scholar
  10. [13]
    C. H. Bennett, G. Brassard, C. Crépeau, and U. M. Maurer, IEEE Trans. Inform Theory 41, 1915 (1995).CrossRefMathSciNetzbMATHGoogle Scholar
  11. [15]
    See P. C. van Oorschot, and S. A. Vanstone, Handbook of Applied Cryptography, CRC Press, New York, 1997 of Ref. [2]. p. 404zbMATHGoogle Scholar
  12. [16]
    A. S. Holevo, Probabilistic and Statistical Aspects of Quantum Theory, North Holland, 1982, Ch. III and IV.Google Scholar
  13. [17]
    H. P. Yuen, in Proceedings of the Workshop on Squeezed States and Uncertainty Relations, NASA Conference Publication 3135, pp. 13–21, 1991. See also H. P. Yuen, “Communication and Measurements with Squeezed States,” in Quantum Squeezing, P. D. Drummond and Z. Ficek, Springer, to be published.ADSGoogle Scholar
  14. [18]
    H. P. Yuen, in Quantum Communications and Measurements II, ed. by P. Kumar, etc., Plenum, 2000, pp. 399–404.Google Scholar

Copyright information

© Kluwer Academic Publishers 2002

Authors and Affiliations

  • Horace P. Yuen
    • 1
  1. 1.Department of Electrical and Computer Engineering Department of Physics and AstronomyNorthwestern UniversityUSA

Personalised recommendations