Quantum Cryptography on Noisy Channels: Quantum versus Classical Key-Agreement Protocols
- 15 November 1999
- journal article
- research article
- Published by American Physical Society (APS) in Physical Review Letters
- Vol. 83 (20) , 4200-4203
- https://doi.org/10.1103/physrevlett.83.4200
Abstract
When the 4-state or the 6-state protocol of quantum cryptography is carried out on a noisy quantum channel, then the raw key has to be processed to reduce the information of a spy down to an arbitrarily low value, providing Alice and Bob with a secret key. In principle, quantum algorithms as well as classical algorithms can be used for this processing. A natural question is: Up to which error rate on the raw key is a secret-key agreement at all possible? Under the assumption of incoherent eavesdropping, we find that the quantum and classical limits are precisely the same: As long as Alice and Bob share some entanglement, both quantum and classical protocols provide secret keys.Keywords
All Related Versions
This publication has 14 references indexed in Scilit:
- Optimal Eavesdropping in Quantum Cryptography with Six StatesPhysical Review Letters, 1998
- Optimal Quantum Cloning MachinesPhysical Review Letters, 1997
- Optimal eavesdropping in quantum cryptography. I. Information bound and optimal strategyPhysical Review A, 1997
- Coherent eavesdropping strategies for the four state quantum cryptography protocolPhysics Letters A, 1997
- Quantum cloning, eavesdropping and Bell's inequalityPhysics Letters A, 1997
- Quantum Privacy Amplification and the Security of Quantum Cryptography over Noisy ChannelsPhysical Review Letters, 1996
- Quantum copying: Beyond the no-cloning theoremPhysical Review A, 1996
- Purification of Noisy Entanglement and Faithful Teleportation via Noisy ChannelsPhysical Review Letters, 1996
- Quantum cryptography based on Bell’s theoremPhysical Review Letters, 1991
- Proposed Experiment to Test Local Hidden-Variable TheoriesPhysical Review Letters, 1969