参考文献:1.C. H. Bennett and G. Brassard, Quantum Cryptography: Public Key Distribution and Coin Tossing, in Proceedings of the IEEE international Conference on Computers, Systems & Signal Processing Bangalore, India, December 1984, p. 175. 2.M. Tomamichel, C. C. Wen Lim, N. Gisin, and R. Renner, Nature Commun. 3, 634 (2011).View Article 3.R. Renner, arXiv/quant-ph:0512258. 4.M. Tomamichel, C. Schaffner, A. Smith, and R. Renner, arXiv/quant-ph:10022436. 5.J. L. Carter and M. N. Wegman, J. Comput. Sys. Sci. 18, 143 (1979).MathSciNet View Article MATH 6.P. Shor and J. Preskill, Phys. Rev. Lett. 85, 441 (2000).ADS View Article 7.S. N. Molotkov and A. V. Timofeev, JETP Lett. 85, 524 (2007).View Article 8.A. N. Klimov, private commun. 9.W.-Y. Hwang, Phys. Rev. Lett. 91, 057901 (2003).ADS View Article 10.S. N. Molotkov, JETP Lett. 95, 342 (2012).ADS View Article 11.A. Chefles, arXiv/quant-ph:9807022; A. Chefles and S. M. Barnett, arXiv/quant-ph:9807023. 12.R. G. Gallager, Information Theory and Reliable Communication (Wiley, New York, 1968). 13.A. S. Holevo, Introduction to Quantum Theory of Information, Ser. Modern Mathem. Physics, No. 5 (MTsNMO, Moscow, 2002); Usp. Mat. Nauk 53, 193 (1998). 14.A. S. Holevo, arXiv:quant-ph/1103.2615. 15.G. M. D鈥橝riano, and M. F. Sacchi, arXiv:quant-ph/11031972. 16.D. A. Kronberg and S. N. Molotkov, JETP Lett. 100, 279 (2014).ADS View Article
作者单位:S. N. Molotkov (1) (2) (3)
1. Institute of Solid State Physics, Russian Academy of Sciences, Chernogolovka, Moscow region, 142432, Russia 2. Academy of Cryptography of the Russian Federation, Moscow, 121552, Russia 3. Faculty of Computational Mathematics and Cybernetics, Moscow State University, Moscow, 119991, Russia
刊物类别:Physics and Astronomy
刊物主题:Physics Elementary Particles and Nuclei Atoms, Molecules, Clusters and Plasmas Solid State Physics and Spectroscopy Russian Library of Science
出版者:MAIK Nauka/Interperiodica distributed exclusively by Springer Science+Business Media LLC.
ISSN:1090-6487
文摘
Internal losses in systems of quantum cryptography can be used at attacks by an eavesdropper. As a result, the security of keys cannot be ensured for a number of protocols. This problem can be solved by using geometrically uniform coherent states with a larger number of bases. The security of keys at the number of bases N b /2 = 4 and the number of states N b = 8 can be guaranteed even without the control of the intensity of input states.