Anonymous-Key Quantum Cryptography and Unconditionally Secure Quantum Bit Commitment
A new cryptographic tool, anonymous quantum key technique, is introduced that leads to unconditionally secure key distribution and encryption schemes that can be readily implemented experimentally in a realistic environment. If quantum memory is available, the technique would have many features of public-key cryptography; an identification protocolthat does not require a shared secret key is provided as an illustration. The possibility is also indicated for obtaining unconditionally secure quantum bit commitment protocols with this technique.
KeywordsQuantum Communication Impersonation Attack Quantum Memory Security Proof Joint Attack
Unable to display preview. Download preview PDF.
- H. P. Yuen, “Unconditionally Secure Quantum Bit Commitment is Possible,” LANL quant-ph/0006109.Google Scholar
- C. H. Bennett and G. Brassard, in Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing, IEEE Press, New York, 1984; p. 175.Google Scholar
- C.W. Helstrom, Quantum Detection and Estimation Theory, Academic Press, 1976, Ch. IV.Google Scholar
- A. S. Holevo, Probabilistic and Statistical Aspects of Quantum Theory, North Holland, 1982, Ch. III and IV.Google Scholar
- H. P. Yuen, in Proceedings of the Workshop on Squeezed States and Uncertainty Relations, NASA Conference Publication 3135, pp. 13–21, 1991. See also H. P. Yuen, “Communication and Measurements with Squeezed States,” in Quantum Squeezing, P. D. Drummond and Z. Ficek, Springer, to be published.ADSGoogle Scholar
- H. P. Yuen, in Quantum Communications and Measurements II, ed. by P. Kumar, etc., Plenum, 2000, pp. 399–404.Google Scholar