# Experimental Quantum Cryptography With Classical Users

@article{Massa2019ExperimentalQC, title={Experimental Quantum Cryptography With Classical Users}, author={Francesco Massa and Preeti Yadav and Amir Moqanaki and Walter O. Krawec and Paulo Mateus and N. Paunkovi'c and Andr{\'e} Souto and Philip Walther}, journal={arXiv: Quantum Physics}, year={2019} }

The exploit of quantum systems allows for insights that promise to revolutionise information processing, although a main challenge for practical implementations is technological complexity. Due to its feasibility, quantum cryptography, which allows for perfectly secure communication, has become the most prominent application of quantum technology. Nevertheless, this task still requires the users to be capable of performing quantum operations, such as state preparation or measurements in… Expand

#### 5 Citations

Semi-quantum cryptography

- Computer Science, Physics
- Quantum Inf. Process.
- 2020

The history and current state-of-the-art in semi-quantum research is surveyed, including security proof methods and how classical post-processing can be used to counteract users' inability to perform certain quantum operations. Expand

High-Dimensional Semiquantum Cryptography

- Computer Science
- IEEE Transactions on Quantum Engineering
- 2020

It is shown that, similar to the fully quantum key distribution case, high-dimensional systems can increase the noise tolerance in the semiquantum case and several general security results are proved which are applicable to other (S)QKD protocols (both high- dimensional ones and standard qubit-based protocols) utilizing a two-way quantum channel. Expand

Lightweight Mediated Semi-Quantum Key Distribution Protocol with a Dishonest Third Party based on Bell States

- Mathematics, Physics
- ArXiv
- 2019

This study takes Bell states as the quantum resource to propose a new MSQKD protocol, in which the classical participants do not need a Trojan horse detector and the TP is dishonest, and the proposed protocol is shown to be secure against well-known attacks and the Classical participants only need two quantum capabilities. Expand

Coherence Equality and Communication in a Quantum Superposition.

- Physics, Mathematics
- Physical review letters
- 2020

This Letter introduces a "coherence equality" that is satisfied by any classical communication-i.e., conveyed by a localized carrier traveling along well defined directions, and develops two simple quantum schemes that deviate systematically from the classical value, thus, violating the coherence equality. Expand

Semi-device-independent quantum key distribution based on a coherence equality

- Physics
- 2021

We introduce the first example of a semi-device-independent quantum key distribution (SDIQKD) protocol with a classical Alice and Bob. The protocol is based on the Coherence Equality (CE) game… Expand

#### References

SHOWING 1-10 OF 34 REFERENCES

Quantum cryptography: Public key distribution and coin tossing

- Physics, Computer Science
- Theor. Comput. Sci.
- 2014

A protocol for coin-tossing by exchange of quantum messages is presented, which is secure against traditional kinds of cheating, even by an opponent with unlimited computing power, but ironically can be subverted by use of a still subtler quantum phenomenon, the Einstein-Podolsky-Rosen paradox. Expand

Counterfactual quantum cryptography.

- Physics, Medicine
- Physical review letters
- 2009

This Letter shows that the task of a secret key distribution can be accomplished even though a particle carrying secret information is not in fact transmitted through the quantum channel, and proposes protocols to implement this task. Expand

Mediated semiquantum key distribution

- Physics
- 2015

In this paper, we design a new quantum key distribution protocol, allowing two limited semi-quantum or "classical" users to establish a shared secret key with the help of a fully quantum server. A… Expand

Security proof of a semi-quantum key distribution protocol

- Computer Science, Physics
- 2015 IEEE International Symposium on Information Theory (ISIT)
- 2015

This paper proves the unconditional security of a particular semi-quantum protocol and derive an expression for its key rate, in the asymptotic scenario. Expand

Quantum cryptography with realistic devices

- Physics, Computer Science
- 2019

Recent advances, such as the measurement-device-independent QKD protocol, have closed the critical side channels in the physical implementations, enabling secure QKKD with realistic devices. Expand

Experimental demonstration of counterfactual quantum communication.

- Physics, Medicine
- Physical review letters
- 2012

This work experimentally demonstrated, for the first time, a faithful implementation for a striking scheme called "counterfactual quantum cryptography" with an on-table realization operating at telecom wavelengths, and reported an illustration on a 1 km fiber. Expand

Security of a single-state semi-quantum key distribution protocol

- Mathematics, Physics
- Quantum Inf. Process.
- 2018

This paper proves the unconditional security of a single-state semi-quantum key distribution protocol proposed by Zou et al. by deriving a lower bound of the protocol’s key rate in the asymptotic scenario and figuring out an error threshold value such that for all error rates that are less than this threshold value, the secure secret key can be established between the legitimate users definitely. Expand

Quantum cryptography with finite resources: unconditional security bound for discrete-variable protocols with one-way postprocessing.

- Computer Science, Physics
- Physical review letters
- 2008

A bound for the security of quantum key distribution with finite resources under one-way postprocessing is derived, based on a definition of security that is composable and has an operational meaning, for standard protocols such as Bennett-Brassard 1984 and six-states protocol. Expand

Quantum key distribution with mismatched measurements over arbitrary channels

- Physics, Computer Science
- Quantum Inf. Comput.
- 2017

This paper derives key-rate expressions for different quantum key distribution protocols from multiple channel statistics, including those gathered from mismatched measurement bases, and demonstrates that their tolerance to noise is higher than previously thought. Expand

Semi-Quantum Key Distribution

- Physics, Computer Science
- ArXiv
- 2008

This work presents two protocols with this constraint, and proves their robustness against attacks: it is proved that any attempt of an adversary to obtain information necessarily induces some errors that the legitimate parties could notice. Expand