Loading…
Implementation of Positive Operator-Valued Measure in Passive Faraday Mirror Attack
Passive Faraday-mirror(PFM) attack is based on imperfect Faraday mirrors in practical quantum cryptography systems and a set of three-dimensional Positive Operator-Valued Measure(POVM) operators plays an important role in this attack.In this paper,we propose a simple scheme to implement the POVM in...
Saved in:
Published in: | Communications in theoretical physics 2015-03, Vol.63 (3), p.296-302 |
---|---|
Main Author: | |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | cdi_FETCH-LOGICAL-c258t-9fec0850ece84c83abd28a7a20ae7401cff2435811f9b3e6ac26155a426839fc3 |
container_end_page | 302 |
container_issue | 3 |
container_start_page | 296 |
container_title | Communications in theoretical physics |
container_volume | 63 |
creator | 王卫龙 高明 马智 |
description | Passive Faraday-mirror(PFM) attack is based on imperfect Faraday mirrors in practical quantum cryptography systems and a set of three-dimensional Positive Operator-Valued Measure(POVM) operators plays an important role in this attack.In this paper,we propose a simple scheme to implement the POVM in PFM attack on an FaradayMichelson quantum cryptography system.Since the POVM can not be implemented directly with previous methods,in this scheme it needs to expand the states sent by Alice and the POVM operators in the attack into four-dimensional Hilbert space first,without changing the attacking effect by calculation.Based on the methods proposed by Ahnert and Payne,the linear-optical setup for implementing the POVM operators is derived.At last,the complete setup for realizing the PFM attack is presented with all parameters.Furthermore,our scheme can also be applied to realize PFM attack on a plug-and-play system by changing the parameters in the setup. |
doi_str_mv | 10.1088/0253-6102/63/3/296 |
format | article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1793261089</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><cqvip_id>664500593</cqvip_id><sourcerecordid>1793261089</sourcerecordid><originalsourceid>FETCH-LOGICAL-c258t-9fec0850ece84c83abd28a7a20ae7401cff2435811f9b3e6ac26155a426839fc3</originalsourceid><addsrcrecordid>eNo9kDtvwjAURq2qlUpp_0CnqFOXNH7Ejj0i1AcSCKQ-VutibmjaEIOdVOLfNwjE9C3nfMMh5J7RJ0a1ziiXIlWM8kyJTGTcqAsyYLLgqclNfkkGZ-Ca3MT4QynlhWID8j7ZbGvcYNNCW_km8WWy8LFqqz9M5lsM0PqQfkHd4SqZIcQuYFI1yQJiPCAvEGAF-2RWheBDMmpbcL-35KqEOuLdaYfk8-X5Y_yWTuevk_FomjoudZuaEh3VkqJDnTstYLniGgrgFLDIKXNlyXMhNWOlWQpU4LhiUkLOlRamdGJIHo-_2-B3HcbWbqrosK6hQd9FywojeoVq06P8iLrgYwxY2m2oNhD2llF7KGgPgewhkFXCCtsX7KWHk_Ttm_WuatZnS6lcUiqNEP9ZG29O</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1793261089</pqid></control><display><type>article</type><title>Implementation of Positive Operator-Valued Measure in Passive Faraday Mirror Attack</title><source>Institute of Physics</source><creator>王卫龙 高明 马智</creator><creatorcontrib>王卫龙 高明 马智</creatorcontrib><description>Passive Faraday-mirror(PFM) attack is based on imperfect Faraday mirrors in practical quantum cryptography systems and a set of three-dimensional Positive Operator-Valued Measure(POVM) operators plays an important role in this attack.In this paper,we propose a simple scheme to implement the POVM in PFM attack on an FaradayMichelson quantum cryptography system.Since the POVM can not be implemented directly with previous methods,in this scheme it needs to expand the states sent by Alice and the POVM operators in the attack into four-dimensional Hilbert space first,without changing the attacking effect by calculation.Based on the methods proposed by Ahnert and Payne,the linear-optical setup for implementing the POVM operators is derived.At last,the complete setup for realizing the PFM attack is presented with all parameters.Furthermore,our scheme can also be applied to realize PFM attack on a plug-and-play system by changing the parameters in the setup.</description><identifier>ISSN: 0253-6102</identifier><identifier>EISSN: 1572-9494</identifier><identifier>DOI: 10.1088/0253-6102/63/3/296</identifier><language>eng</language><subject>Hilbert space ; Mathematical analysis ; Operators ; PFM ; Quantum cryptography ; Theoretical physics ; Three dimensional ; 击实 ; 加密系统 ; 希尔伯特空间 ; 法拉第镜 ; 算子值测度 ; 线性光学 ; 量子密码系统</subject><ispartof>Communications in theoretical physics, 2015-03, Vol.63 (3), p.296-302</ispartof><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c258t-9fec0850ece84c83abd28a7a20ae7401cff2435811f9b3e6ac26155a426839fc3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Uhttp://image.cqvip.com/vip1000/qk/83837X/83837X.jpg</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><creatorcontrib>王卫龙 高明 马智</creatorcontrib><title>Implementation of Positive Operator-Valued Measure in Passive Faraday Mirror Attack</title><title>Communications in theoretical physics</title><addtitle>Communications in Theoretical Physics</addtitle><description>Passive Faraday-mirror(PFM) attack is based on imperfect Faraday mirrors in practical quantum cryptography systems and a set of three-dimensional Positive Operator-Valued Measure(POVM) operators plays an important role in this attack.In this paper,we propose a simple scheme to implement the POVM in PFM attack on an FaradayMichelson quantum cryptography system.Since the POVM can not be implemented directly with previous methods,in this scheme it needs to expand the states sent by Alice and the POVM operators in the attack into four-dimensional Hilbert space first,without changing the attacking effect by calculation.Based on the methods proposed by Ahnert and Payne,the linear-optical setup for implementing the POVM operators is derived.At last,the complete setup for realizing the PFM attack is presented with all parameters.Furthermore,our scheme can also be applied to realize PFM attack on a plug-and-play system by changing the parameters in the setup.</description><subject>Hilbert space</subject><subject>Mathematical analysis</subject><subject>Operators</subject><subject>PFM</subject><subject>Quantum cryptography</subject><subject>Theoretical physics</subject><subject>Three dimensional</subject><subject>击实</subject><subject>加密系统</subject><subject>希尔伯特空间</subject><subject>法拉第镜</subject><subject>算子值测度</subject><subject>线性光学</subject><subject>量子密码系统</subject><issn>0253-6102</issn><issn>1572-9494</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2015</creationdate><recordtype>article</recordtype><recordid>eNo9kDtvwjAURq2qlUpp_0CnqFOXNH7Ejj0i1AcSCKQ-VutibmjaEIOdVOLfNwjE9C3nfMMh5J7RJ0a1ziiXIlWM8kyJTGTcqAsyYLLgqclNfkkGZ-Ca3MT4QynlhWID8j7ZbGvcYNNCW_km8WWy8LFqqz9M5lsM0PqQfkHd4SqZIcQuYFI1yQJiPCAvEGAF-2RWheBDMmpbcL-35KqEOuLdaYfk8-X5Y_yWTuevk_FomjoudZuaEh3VkqJDnTstYLniGgrgFLDIKXNlyXMhNWOlWQpU4LhiUkLOlRamdGJIHo-_2-B3HcbWbqrosK6hQd9FywojeoVq06P8iLrgYwxY2m2oNhD2llF7KGgPgewhkFXCCtsX7KWHk_Ttm_WuatZnS6lcUiqNEP9ZG29O</recordid><startdate>20150301</startdate><enddate>20150301</enddate><creator>王卫龙 高明 马智</creator><scope>2RA</scope><scope>92L</scope><scope>CQIGP</scope><scope>~WA</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7U5</scope><scope>8FD</scope><scope>H8D</scope><scope>L7M</scope></search><sort><creationdate>20150301</creationdate><title>Implementation of Positive Operator-Valued Measure in Passive Faraday Mirror Attack</title><author>王卫龙 高明 马智</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c258t-9fec0850ece84c83abd28a7a20ae7401cff2435811f9b3e6ac26155a426839fc3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2015</creationdate><topic>Hilbert space</topic><topic>Mathematical analysis</topic><topic>Operators</topic><topic>PFM</topic><topic>Quantum cryptography</topic><topic>Theoretical physics</topic><topic>Three dimensional</topic><topic>击实</topic><topic>加密系统</topic><topic>希尔伯特空间</topic><topic>法拉第镜</topic><topic>算子值测度</topic><topic>线性光学</topic><topic>量子密码系统</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>王卫龙 高明 马智</creatorcontrib><collection>中文科技期刊数据库</collection><collection>中文科技期刊数据库-CALIS站点</collection><collection>维普中文期刊数据库</collection><collection>中文科技期刊数据库- 镜像站点</collection><collection>CrossRef</collection><collection>Solid State and Superconductivity Abstracts</collection><collection>Technology Research Database</collection><collection>Aerospace Database</collection><collection>Advanced Technologies Database with Aerospace</collection><jtitle>Communications in theoretical physics</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>王卫龙 高明 马智</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Implementation of Positive Operator-Valued Measure in Passive Faraday Mirror Attack</atitle><jtitle>Communications in theoretical physics</jtitle><addtitle>Communications in Theoretical Physics</addtitle><date>2015-03-01</date><risdate>2015</risdate><volume>63</volume><issue>3</issue><spage>296</spage><epage>302</epage><pages>296-302</pages><issn>0253-6102</issn><eissn>1572-9494</eissn><abstract>Passive Faraday-mirror(PFM) attack is based on imperfect Faraday mirrors in practical quantum cryptography systems and a set of three-dimensional Positive Operator-Valued Measure(POVM) operators plays an important role in this attack.In this paper,we propose a simple scheme to implement the POVM in PFM attack on an FaradayMichelson quantum cryptography system.Since the POVM can not be implemented directly with previous methods,in this scheme it needs to expand the states sent by Alice and the POVM operators in the attack into four-dimensional Hilbert space first,without changing the attacking effect by calculation.Based on the methods proposed by Ahnert and Payne,the linear-optical setup for implementing the POVM operators is derived.At last,the complete setup for realizing the PFM attack is presented with all parameters.Furthermore,our scheme can also be applied to realize PFM attack on a plug-and-play system by changing the parameters in the setup.</abstract><doi>10.1088/0253-6102/63/3/296</doi><tpages>7</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0253-6102 |
ispartof | Communications in theoretical physics, 2015-03, Vol.63 (3), p.296-302 |
issn | 0253-6102 1572-9494 |
language | eng |
recordid | cdi_proquest_miscellaneous_1793261089 |
source | Institute of Physics |
subjects | Hilbert space Mathematical analysis Operators PFM Quantum cryptography Theoretical physics Three dimensional 击实 加密系统 希尔伯特空间 法拉第镜 算子值测度 线性光学 量子密码系统 |
title | Implementation of Positive Operator-Valued Measure in Passive Faraday Mirror Attack |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-23T07%3A34%3A14IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Implementation%20of%20Positive%20Operator-Valued%20Measure%20in%20Passive%20Faraday%20Mirror%20Attack&rft.jtitle=Communications%20in%20theoretical%20physics&rft.au=%E7%8E%8B%E5%8D%AB%E9%BE%99%20%E9%AB%98%E6%98%8E%20%E9%A9%AC%E6%99%BA&rft.date=2015-03-01&rft.volume=63&rft.issue=3&rft.spage=296&rft.epage=302&rft.pages=296-302&rft.issn=0253-6102&rft.eissn=1572-9494&rft_id=info:doi/10.1088/0253-6102/63/3/296&rft_dat=%3Cproquest_cross%3E1793261089%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c258t-9fec0850ece84c83abd28a7a20ae7401cff2435811f9b3e6ac26155a426839fc3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=1793261089&rft_id=info:pmid/&rft_cqvip_id=664500593&rfr_iscdi=true |