Private entanglement over arbitrary distances, even using noisy apparatus
- PMID: 11801170
- DOI: 10.1103/PhysRevLett.88.047902
Private entanglement over arbitrary distances, even using noisy apparatus
Abstract
We give a security proof of quantum cryptography based entirely on entanglement purification. Our proof applies to all possible attacks (individual and coherent). It implies the security of cryptographic keys distributed with the help of entanglement-based quantum repeaters. We prove the security of the obtained quantum channel which may not be used only for quantum key distribution, but also for secure, albeit noisy, transmission of quantum information.
Similar articles
-
Simple proof of security of the BB84 quantum key distribution protocol.Phys Rev Lett. 2000 Jul 10;85(2):441-4. doi: 10.1103/PhysRevLett.85.441. Phys Rev Lett. 2000. PMID: 10991303
-
Entanglement-based secure quantum cryptography over 1,120 kilometres.Nature. 2020 Jun;582(7813):501-505. doi: 10.1038/s41586-020-2401-y. Epub 2020 Jun 15. Nature. 2020. PMID: 32541968
-
Tomographic quantum cryptography: equivalence of quantum and classical key distillation.Phys Rev Lett. 2003 Aug 29;91(9):097901. doi: 10.1103/PhysRevLett.91.097901. Epub 2003 Aug 25. Phys Rev Lett. 2003. PMID: 14525209
-
Continuous-variable quantum cryptography is secure against non-Gaussian attacks.Phys Rev Lett. 2004 Jan 30;92(4):047905. doi: 10.1103/PhysRevLett.92.047905. Epub 2004 Jan 30. Phys Rev Lett. 2004. PMID: 14995411
-
Transitioning organizations to post-quantum cryptography.Nature. 2022 May;605(7909):237-243. doi: 10.1038/s41586-022-04623-2. Epub 2022 May 11. Nature. 2022. PMID: 35546191 Review.
Cited by
-
Using cyclic Hadamard masks for single-pixel quantum imaging under entangled photon illumination.Sci Adv. 2025 Aug 22;11(34):eadw4799. doi: 10.1126/sciadv.adw4799. Epub 2025 Aug 20. Sci Adv. 2025. PMID: 40834094 Free PMC article.
LinkOut - more resources
Full Text Sources