Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group
  • The Pacific Rim Conference on Lasers and Electro-Optics
  • Technical Digest Series (Optica Publishing Group, 1995),
  • paper TuF3

Quantum cryptography with coherent states

Not Accessible

Your library or personal account may give you access

Abstract

The only known method to exchange secret information through a communication channel in a proven secure way, is to use the so-called one-time pad. in this technique, the data, which is represented by a string of bits, is combined with a random string of bits of equal length called the key, and is then sent through the communication channel. The randomness of the key ensures that the encoded message is also completely random and as such totally unintelligible to a potential eavesdropper. The safety of the transmission is thus entirely dependent on the safety of the key, which has to be secret and shared just by both legitimate users. Moreover, safety can be guaranteed only if the key is used once, and then discarded.

© 1995 IEEE

PDF Article
More Like This
Information Leakage Estimates in Quantum Cryptography

Boris A. Slutsky, R. Rao, L. Tancevski, P. C. Sun, and Y. Fainman
OWC.2 Optics in Computing (IP) 1997

Experimental six-state quantum cryptography

Paul G. Kwiat, Daphna G. Enzer, Phillip G. Hadley, and C. Glen Peterson
FQIPB4 International Conference on Quantum Information (QIM) 2001

Quantum Cryptography with Coherent-state Light: Demonstration of a Secure Data Encryption Scheme Operating at 100 kb/s

Geraldo A. Barbosa, Eric Corndorf, and Prem Kumar
QThD3 Quantum Electronics and Laser Science Conference (CLEO:FS) 2002

Select as filters


Select Topics Cancel
© Copyright 2024 | Optica Publishing Group. All rights reserved, including rights for text and data mining and training of artificial technologies or similar technologies.