Implementation of Positive Operator-Valued Measure in Passive Faraday Mirror Attack
Passive Faraday-mirror(PFM) attack is based on imperfect Faraday mirrors in practical quantum cryptography systems and a set of three-dimensional Positive Operator-Valued Measure(POVM) operators plays an important role in this attack.In this paper,we propose a simple scheme to implement the POVM in...
Gespeichert in:
Veröffentlicht in: | Communications in theoretical physics 2015-03, Vol.63 (3), p.296-302 |
---|---|
1. Verfasser: | |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 302 |
---|---|
container_issue | 3 |
container_start_page | 296 |
container_title | Communications in theoretical physics |
container_volume | 63 |
creator | 王卫龙 高明 马智 |
description | Passive Faraday-mirror(PFM) attack is based on imperfect Faraday mirrors in practical quantum cryptography systems and a set of three-dimensional Positive Operator-Valued Measure(POVM) operators plays an important role in this attack.In this paper,we propose a simple scheme to implement the POVM in PFM attack on an FaradayMichelson quantum cryptography system.Since the POVM can not be implemented directly with previous methods,in this scheme it needs to expand the states sent by Alice and the POVM operators in the attack into four-dimensional Hilbert space first,without changing the attacking effect by calculation.Based on the methods proposed by Ahnert and Payne,the linear-optical setup for implementing the POVM operators is derived.At last,the complete setup for realizing the PFM attack is presented with all parameters.Furthermore,our scheme can also be applied to realize PFM attack on a plug-and-play system by changing the parameters in the setup. |
doi_str_mv | 10.1088/0253-6102/63/3/296 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1793261089</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><cqvip_id>664500593</cqvip_id><sourcerecordid>1793261089</sourcerecordid><originalsourceid>FETCH-LOGICAL-c258t-9fec0850ece84c83abd28a7a20ae7401cff2435811f9b3e6ac26155a426839fc3</originalsourceid><addsrcrecordid>eNo9kDtvwjAURq2qlUpp_0CnqFOXNH7Ejj0i1AcSCKQ-VutibmjaEIOdVOLfNwjE9C3nfMMh5J7RJ0a1ziiXIlWM8kyJTGTcqAsyYLLgqclNfkkGZ-Ca3MT4QynlhWID8j7ZbGvcYNNCW_km8WWy8LFqqz9M5lsM0PqQfkHd4SqZIcQuYFI1yQJiPCAvEGAF-2RWheBDMmpbcL-35KqEOuLdaYfk8-X5Y_yWTuevk_FomjoudZuaEh3VkqJDnTstYLniGgrgFLDIKXNlyXMhNWOlWQpU4LhiUkLOlRamdGJIHo-_2-B3HcbWbqrosK6hQd9FywojeoVq06P8iLrgYwxY2m2oNhD2llF7KGgPgewhkFXCCtsX7KWHk_Ttm_WuatZnS6lcUiqNEP9ZG29O</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1793261089</pqid></control><display><type>article</type><title>Implementation of Positive Operator-Valued Measure in Passive Faraday Mirror Attack</title><source>IOP Publishing Journals</source><source>Institute of Physics (IOP) Journals - HEAL-Link</source><source>Alma/SFX Local Collection</source><creator>王卫龙 高明 马智</creator><creatorcontrib>王卫龙 高明 马智</creatorcontrib><description>Passive Faraday-mirror(PFM) attack is based on imperfect Faraday mirrors in practical quantum cryptography systems and a set of three-dimensional Positive Operator-Valued Measure(POVM) operators plays an important role in this attack.In this paper,we propose a simple scheme to implement the POVM in PFM attack on an FaradayMichelson quantum cryptography system.Since the POVM can not be implemented directly with previous methods,in this scheme it needs to expand the states sent by Alice and the POVM operators in the attack into four-dimensional Hilbert space first,without changing the attacking effect by calculation.Based on the methods proposed by Ahnert and Payne,the linear-optical setup for implementing the POVM operators is derived.At last,the complete setup for realizing the PFM attack is presented with all parameters.Furthermore,our scheme can also be applied to realize PFM attack on a plug-and-play system by changing the parameters in the setup.</description><identifier>ISSN: 0253-6102</identifier><identifier>EISSN: 1572-9494</identifier><identifier>DOI: 10.1088/0253-6102/63/3/296</identifier><language>eng</language><subject>Hilbert space ; Mathematical analysis ; Operators ; PFM ; Quantum cryptography ; Theoretical physics ; Three dimensional ; 击实 ; 加密系统 ; 希尔伯特空间 ; 法拉第镜 ; 算子值测度 ; 线性光学 ; 量子密码系统</subject><ispartof>Communications in theoretical physics, 2015-03, Vol.63 (3), p.296-302</ispartof><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c258t-9fec0850ece84c83abd28a7a20ae7401cff2435811f9b3e6ac26155a426839fc3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Uhttp://image.cqvip.com/vip1000/qk/83837X/83837X.jpg</thumbnail><link.rule.ids>314,776,780,27901,27902</link.rule.ids></links><search><creatorcontrib>王卫龙 高明 马智</creatorcontrib><title>Implementation of Positive Operator-Valued Measure in Passive Faraday Mirror Attack</title><title>Communications in theoretical physics</title><addtitle>Communications in Theoretical Physics</addtitle><description>Passive Faraday-mirror(PFM) attack is based on imperfect Faraday mirrors in practical quantum cryptography systems and a set of three-dimensional Positive Operator-Valued Measure(POVM) operators plays an important role in this attack.In this paper,we propose a simple scheme to implement the POVM in PFM attack on an FaradayMichelson quantum cryptography system.Since the POVM can not be implemented directly with previous methods,in this scheme it needs to expand the states sent by Alice and the POVM operators in the attack into four-dimensional Hilbert space first,without changing the attacking effect by calculation.Based on the methods proposed by Ahnert and Payne,the linear-optical setup for implementing the POVM operators is derived.At last,the complete setup for realizing the PFM attack is presented with all parameters.Furthermore,our scheme can also be applied to realize PFM attack on a plug-and-play system by changing the parameters in the setup.</description><subject>Hilbert space</subject><subject>Mathematical analysis</subject><subject>Operators</subject><subject>PFM</subject><subject>Quantum cryptography</subject><subject>Theoretical physics</subject><subject>Three dimensional</subject><subject>击实</subject><subject>加密系统</subject><subject>希尔伯特空间</subject><subject>法拉第镜</subject><subject>算子值测度</subject><subject>线性光学</subject><subject>量子密码系统</subject><issn>0253-6102</issn><issn>1572-9494</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2015</creationdate><recordtype>article</recordtype><recordid>eNo9kDtvwjAURq2qlUpp_0CnqFOXNH7Ejj0i1AcSCKQ-VutibmjaEIOdVOLfNwjE9C3nfMMh5J7RJ0a1ziiXIlWM8kyJTGTcqAsyYLLgqclNfkkGZ-Ca3MT4QynlhWID8j7ZbGvcYNNCW_km8WWy8LFqqz9M5lsM0PqQfkHd4SqZIcQuYFI1yQJiPCAvEGAF-2RWheBDMmpbcL-35KqEOuLdaYfk8-X5Y_yWTuevk_FomjoudZuaEh3VkqJDnTstYLniGgrgFLDIKXNlyXMhNWOlWQpU4LhiUkLOlRamdGJIHo-_2-B3HcbWbqrosK6hQd9FywojeoVq06P8iLrgYwxY2m2oNhD2llF7KGgPgewhkFXCCtsX7KWHk_Ttm_WuatZnS6lcUiqNEP9ZG29O</recordid><startdate>20150301</startdate><enddate>20150301</enddate><creator>王卫龙 高明 马智</creator><scope>2RA</scope><scope>92L</scope><scope>CQIGP</scope><scope>~WA</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7U5</scope><scope>8FD</scope><scope>H8D</scope><scope>L7M</scope></search><sort><creationdate>20150301</creationdate><title>Implementation of Positive Operator-Valued Measure in Passive Faraday Mirror Attack</title><author>王卫龙 高明 马智</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c258t-9fec0850ece84c83abd28a7a20ae7401cff2435811f9b3e6ac26155a426839fc3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2015</creationdate><topic>Hilbert space</topic><topic>Mathematical analysis</topic><topic>Operators</topic><topic>PFM</topic><topic>Quantum cryptography</topic><topic>Theoretical physics</topic><topic>Three dimensional</topic><topic>击实</topic><topic>加密系统</topic><topic>希尔伯特空间</topic><topic>法拉第镜</topic><topic>算子值测度</topic><topic>线性光学</topic><topic>量子密码系统</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>王卫龙 高明 马智</creatorcontrib><collection>中文科技期刊数据库</collection><collection>中文科技期刊数据库-CALIS站点</collection><collection>中文科技期刊数据库-7.0平台</collection><collection>中文科技期刊数据库- 镜像站点</collection><collection>CrossRef</collection><collection>Solid State and Superconductivity Abstracts</collection><collection>Technology Research Database</collection><collection>Aerospace Database</collection><collection>Advanced Technologies Database with Aerospace</collection><jtitle>Communications in theoretical physics</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>王卫龙 高明 马智</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Implementation of Positive Operator-Valued Measure in Passive Faraday Mirror Attack</atitle><jtitle>Communications in theoretical physics</jtitle><addtitle>Communications in Theoretical Physics</addtitle><date>2015-03-01</date><risdate>2015</risdate><volume>63</volume><issue>3</issue><spage>296</spage><epage>302</epage><pages>296-302</pages><issn>0253-6102</issn><eissn>1572-9494</eissn><abstract>Passive Faraday-mirror(PFM) attack is based on imperfect Faraday mirrors in practical quantum cryptography systems and a set of three-dimensional Positive Operator-Valued Measure(POVM) operators plays an important role in this attack.In this paper,we propose a simple scheme to implement the POVM in PFM attack on an FaradayMichelson quantum cryptography system.Since the POVM can not be implemented directly with previous methods,in this scheme it needs to expand the states sent by Alice and the POVM operators in the attack into four-dimensional Hilbert space first,without changing the attacking effect by calculation.Based on the methods proposed by Ahnert and Payne,the linear-optical setup for implementing the POVM operators is derived.At last,the complete setup for realizing the PFM attack is presented with all parameters.Furthermore,our scheme can also be applied to realize PFM attack on a plug-and-play system by changing the parameters in the setup.</abstract><doi>10.1088/0253-6102/63/3/296</doi><tpages>7</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0253-6102 |
ispartof | Communications in theoretical physics, 2015-03, Vol.63 (3), p.296-302 |
issn | 0253-6102 1572-9494 |
language | eng |
recordid | cdi_proquest_miscellaneous_1793261089 |
source | IOP Publishing Journals; Institute of Physics (IOP) Journals - HEAL-Link; Alma/SFX Local Collection |
subjects | Hilbert space Mathematical analysis Operators PFM Quantum cryptography Theoretical physics Three dimensional 击实 加密系统 希尔伯特空间 法拉第镜 算子值测度 线性光学 量子密码系统 |
title | Implementation of Positive Operator-Valued Measure in Passive Faraday Mirror Attack |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-04T09%3A46%3A23IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Implementation%20of%20Positive%20Operator-Valued%20Measure%20in%20Passive%20Faraday%20Mirror%20Attack&rft.jtitle=Communications%20in%20theoretical%20physics&rft.au=%E7%8E%8B%E5%8D%AB%E9%BE%99%20%E9%AB%98%E6%98%8E%20%E9%A9%AC%E6%99%BA&rft.date=2015-03-01&rft.volume=63&rft.issue=3&rft.spage=296&rft.epage=302&rft.pages=296-302&rft.issn=0253-6102&rft.eissn=1572-9494&rft_id=info:doi/10.1088/0253-6102/63/3/296&rft_dat=%3Cproquest_cross%3E1793261089%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1793261089&rft_id=info:pmid/&rft_cqvip_id=664500593&rfr_iscdi=true |