Loading…

Implementation of Positive Operator-Valued Measure in Passive Faraday Mirror Attack

Passive Faraday-mirror(PFM) attack is based on imperfect Faraday mirrors in practical quantum cryptography systems and a set of three-dimensional Positive Operator-Valued Measure(POVM) operators plays an important role in this attack.In this paper,we propose a simple scheme to implement the POVM in...

Full description

Saved in:
Bibliographic Details
Published in:Communications in theoretical physics 2015-03, Vol.63 (3), p.296-302
Main Author: 王卫龙 高明 马智
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites cdi_FETCH-LOGICAL-c258t-9fec0850ece84c83abd28a7a20ae7401cff2435811f9b3e6ac26155a426839fc3
container_end_page 302
container_issue 3
container_start_page 296
container_title Communications in theoretical physics
container_volume 63
creator 王卫龙 高明 马智
description Passive Faraday-mirror(PFM) attack is based on imperfect Faraday mirrors in practical quantum cryptography systems and a set of three-dimensional Positive Operator-Valued Measure(POVM) operators plays an important role in this attack.In this paper,we propose a simple scheme to implement the POVM in PFM attack on an FaradayMichelson quantum cryptography system.Since the POVM can not be implemented directly with previous methods,in this scheme it needs to expand the states sent by Alice and the POVM operators in the attack into four-dimensional Hilbert space first,without changing the attacking effect by calculation.Based on the methods proposed by Ahnert and Payne,the linear-optical setup for implementing the POVM operators is derived.At last,the complete setup for realizing the PFM attack is presented with all parameters.Furthermore,our scheme can also be applied to realize PFM attack on a plug-and-play system by changing the parameters in the setup.
doi_str_mv 10.1088/0253-6102/63/3/296
format article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1793261089</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><cqvip_id>664500593</cqvip_id><sourcerecordid>1793261089</sourcerecordid><originalsourceid>FETCH-LOGICAL-c258t-9fec0850ece84c83abd28a7a20ae7401cff2435811f9b3e6ac26155a426839fc3</originalsourceid><addsrcrecordid>eNo9kDtvwjAURq2qlUpp_0CnqFOXNH7Ejj0i1AcSCKQ-VutibmjaEIOdVOLfNwjE9C3nfMMh5J7RJ0a1ziiXIlWM8kyJTGTcqAsyYLLgqclNfkkGZ-Ca3MT4QynlhWID8j7ZbGvcYNNCW_km8WWy8LFqqz9M5lsM0PqQfkHd4SqZIcQuYFI1yQJiPCAvEGAF-2RWheBDMmpbcL-35KqEOuLdaYfk8-X5Y_yWTuevk_FomjoudZuaEh3VkqJDnTstYLniGgrgFLDIKXNlyXMhNWOlWQpU4LhiUkLOlRamdGJIHo-_2-B3HcbWbqrosK6hQd9FywojeoVq06P8iLrgYwxY2m2oNhD2llF7KGgPgewhkFXCCtsX7KWHk_Ttm_WuatZnS6lcUiqNEP9ZG29O</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1793261089</pqid></control><display><type>article</type><title>Implementation of Positive Operator-Valued Measure in Passive Faraday Mirror Attack</title><source>Institute of Physics</source><creator>王卫龙 高明 马智</creator><creatorcontrib>王卫龙 高明 马智</creatorcontrib><description>Passive Faraday-mirror(PFM) attack is based on imperfect Faraday mirrors in practical quantum cryptography systems and a set of three-dimensional Positive Operator-Valued Measure(POVM) operators plays an important role in this attack.In this paper,we propose a simple scheme to implement the POVM in PFM attack on an FaradayMichelson quantum cryptography system.Since the POVM can not be implemented directly with previous methods,in this scheme it needs to expand the states sent by Alice and the POVM operators in the attack into four-dimensional Hilbert space first,without changing the attacking effect by calculation.Based on the methods proposed by Ahnert and Payne,the linear-optical setup for implementing the POVM operators is derived.At last,the complete setup for realizing the PFM attack is presented with all parameters.Furthermore,our scheme can also be applied to realize PFM attack on a plug-and-play system by changing the parameters in the setup.</description><identifier>ISSN: 0253-6102</identifier><identifier>EISSN: 1572-9494</identifier><identifier>DOI: 10.1088/0253-6102/63/3/296</identifier><language>eng</language><subject>Hilbert space ; Mathematical analysis ; Operators ; PFM ; Quantum cryptography ; Theoretical physics ; Three dimensional ; 击实 ; 加密系统 ; 希尔伯特空间 ; 法拉第镜 ; 算子值测度 ; 线性光学 ; 量子密码系统</subject><ispartof>Communications in theoretical physics, 2015-03, Vol.63 (3), p.296-302</ispartof><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c258t-9fec0850ece84c83abd28a7a20ae7401cff2435811f9b3e6ac26155a426839fc3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Uhttp://image.cqvip.com/vip1000/qk/83837X/83837X.jpg</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><creatorcontrib>王卫龙 高明 马智</creatorcontrib><title>Implementation of Positive Operator-Valued Measure in Passive Faraday Mirror Attack</title><title>Communications in theoretical physics</title><addtitle>Communications in Theoretical Physics</addtitle><description>Passive Faraday-mirror(PFM) attack is based on imperfect Faraday mirrors in practical quantum cryptography systems and a set of three-dimensional Positive Operator-Valued Measure(POVM) operators plays an important role in this attack.In this paper,we propose a simple scheme to implement the POVM in PFM attack on an FaradayMichelson quantum cryptography system.Since the POVM can not be implemented directly with previous methods,in this scheme it needs to expand the states sent by Alice and the POVM operators in the attack into four-dimensional Hilbert space first,without changing the attacking effect by calculation.Based on the methods proposed by Ahnert and Payne,the linear-optical setup for implementing the POVM operators is derived.At last,the complete setup for realizing the PFM attack is presented with all parameters.Furthermore,our scheme can also be applied to realize PFM attack on a plug-and-play system by changing the parameters in the setup.</description><subject>Hilbert space</subject><subject>Mathematical analysis</subject><subject>Operators</subject><subject>PFM</subject><subject>Quantum cryptography</subject><subject>Theoretical physics</subject><subject>Three dimensional</subject><subject>击实</subject><subject>加密系统</subject><subject>希尔伯特空间</subject><subject>法拉第镜</subject><subject>算子值测度</subject><subject>线性光学</subject><subject>量子密码系统</subject><issn>0253-6102</issn><issn>1572-9494</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2015</creationdate><recordtype>article</recordtype><recordid>eNo9kDtvwjAURq2qlUpp_0CnqFOXNH7Ejj0i1AcSCKQ-VutibmjaEIOdVOLfNwjE9C3nfMMh5J7RJ0a1ziiXIlWM8kyJTGTcqAsyYLLgqclNfkkGZ-Ca3MT4QynlhWID8j7ZbGvcYNNCW_km8WWy8LFqqz9M5lsM0PqQfkHd4SqZIcQuYFI1yQJiPCAvEGAF-2RWheBDMmpbcL-35KqEOuLdaYfk8-X5Y_yWTuevk_FomjoudZuaEh3VkqJDnTstYLniGgrgFLDIKXNlyXMhNWOlWQpU4LhiUkLOlRamdGJIHo-_2-B3HcbWbqrosK6hQd9FywojeoVq06P8iLrgYwxY2m2oNhD2llF7KGgPgewhkFXCCtsX7KWHk_Ttm_WuatZnS6lcUiqNEP9ZG29O</recordid><startdate>20150301</startdate><enddate>20150301</enddate><creator>王卫龙 高明 马智</creator><scope>2RA</scope><scope>92L</scope><scope>CQIGP</scope><scope>~WA</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7U5</scope><scope>8FD</scope><scope>H8D</scope><scope>L7M</scope></search><sort><creationdate>20150301</creationdate><title>Implementation of Positive Operator-Valued Measure in Passive Faraday Mirror Attack</title><author>王卫龙 高明 马智</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c258t-9fec0850ece84c83abd28a7a20ae7401cff2435811f9b3e6ac26155a426839fc3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2015</creationdate><topic>Hilbert space</topic><topic>Mathematical analysis</topic><topic>Operators</topic><topic>PFM</topic><topic>Quantum cryptography</topic><topic>Theoretical physics</topic><topic>Three dimensional</topic><topic>击实</topic><topic>加密系统</topic><topic>希尔伯特空间</topic><topic>法拉第镜</topic><topic>算子值测度</topic><topic>线性光学</topic><topic>量子密码系统</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>王卫龙 高明 马智</creatorcontrib><collection>中文科技期刊数据库</collection><collection>中文科技期刊数据库-CALIS站点</collection><collection>维普中文期刊数据库</collection><collection>中文科技期刊数据库- 镜像站点</collection><collection>CrossRef</collection><collection>Solid State and Superconductivity Abstracts</collection><collection>Technology Research Database</collection><collection>Aerospace Database</collection><collection>Advanced Technologies Database with Aerospace</collection><jtitle>Communications in theoretical physics</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>王卫龙 高明 马智</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Implementation of Positive Operator-Valued Measure in Passive Faraday Mirror Attack</atitle><jtitle>Communications in theoretical physics</jtitle><addtitle>Communications in Theoretical Physics</addtitle><date>2015-03-01</date><risdate>2015</risdate><volume>63</volume><issue>3</issue><spage>296</spage><epage>302</epage><pages>296-302</pages><issn>0253-6102</issn><eissn>1572-9494</eissn><abstract>Passive Faraday-mirror(PFM) attack is based on imperfect Faraday mirrors in practical quantum cryptography systems and a set of three-dimensional Positive Operator-Valued Measure(POVM) operators plays an important role in this attack.In this paper,we propose a simple scheme to implement the POVM in PFM attack on an FaradayMichelson quantum cryptography system.Since the POVM can not be implemented directly with previous methods,in this scheme it needs to expand the states sent by Alice and the POVM operators in the attack into four-dimensional Hilbert space first,without changing the attacking effect by calculation.Based on the methods proposed by Ahnert and Payne,the linear-optical setup for implementing the POVM operators is derived.At last,the complete setup for realizing the PFM attack is presented with all parameters.Furthermore,our scheme can also be applied to realize PFM attack on a plug-and-play system by changing the parameters in the setup.</abstract><doi>10.1088/0253-6102/63/3/296</doi><tpages>7</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0253-6102
ispartof Communications in theoretical physics, 2015-03, Vol.63 (3), p.296-302
issn 0253-6102
1572-9494
language eng
recordid cdi_proquest_miscellaneous_1793261089
source Institute of Physics
subjects Hilbert space
Mathematical analysis
Operators
PFM
Quantum cryptography
Theoretical physics
Three dimensional
击实
加密系统
希尔伯特空间
法拉第镜
算子值测度
线性光学
量子密码系统
title Implementation of Positive Operator-Valued Measure in Passive Faraday Mirror Attack
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-23T07%3A34%3A14IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Implementation%20of%20Positive%20Operator-Valued%20Measure%20in%20Passive%20Faraday%20Mirror%20Attack&rft.jtitle=Communications%20in%20theoretical%20physics&rft.au=%E7%8E%8B%E5%8D%AB%E9%BE%99%20%E9%AB%98%E6%98%8E%20%E9%A9%AC%E6%99%BA&rft.date=2015-03-01&rft.volume=63&rft.issue=3&rft.spage=296&rft.epage=302&rft.pages=296-302&rft.issn=0253-6102&rft.eissn=1572-9494&rft_id=info:doi/10.1088/0253-6102/63/3/296&rft_dat=%3Cproquest_cross%3E1793261089%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c258t-9fec0850ece84c83abd28a7a20ae7401cff2435811f9b3e6ac26155a426839fc3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=1793261089&rft_id=info:pmid/&rft_cqvip_id=664500593&rfr_iscdi=true