Quantum Key Distribution against Trojan Horse Attacks
-
Abstract
Realistic experimental apparatus of quantum cryptography are imperfect,
which may be utilized by a potential eavesdropper to eavesdrop on the
communication. We show that quantum communication may be improved with
quantum teleportation and entanglement swapping, which is robustly secure
against the most general Trojan horse attacks. Our scheme is not an
improvement of the communication apparatus, but the improvement of
quantum communication protocol itself. We show that our modified schemes
may be implemented with current technology.
Article Text
-
-
-
About This Article
Cite this article:
CAI Qing-Yu, LV Hua. Quantum Key Distribution against Trojan Horse Attacks[J]. Chin. Phys. Lett., 2007, 24(5): 1154-1157.
CAI Qing-Yu, LV Hua. Quantum Key Distribution against Trojan Horse Attacks[J]. Chin. Phys. Lett., 2007, 24(5): 1154-1157.
|
CAI Qing-Yu, LV Hua. Quantum Key Distribution against Trojan Horse Attacks[J]. Chin. Phys. Lett., 2007, 24(5): 1154-1157.
CAI Qing-Yu, LV Hua. Quantum Key Distribution against Trojan Horse Attacks[J]. Chin. Phys. Lett., 2007, 24(5): 1154-1157.
|