19,847 research outputs found
EDP Security- Necessity or Mania?
Ms. Wise is an Instructor in the Department of Management in the School of Business, Georgia Southern College
Decoy state quantum key distribution with two-way classical post-processing
Decoy states have recently been proposed as a useful method for substantially
improving the performance of quantum key distribution protocols when a coherent
state source is used. Previously, data post-processing schemes based on one-way
classical communications were considered for use with decoy states. In this
paper, we develop two data post-processing schemes for the decoy-state method
using two-way classical communications. Our numerical simulation (using
parameters from a specific QKD experiment as an example) results show that our
scheme is able to extend the maximal secure distance from 142km (using only
one-way classical communications with decoy states) to 181km. The second scheme
is able to achieve a 10% greater key generation rate in the whole regime of
distances
Unconditional Security of the Bennett 1992 quantum key-distribution over lossy and noisy channel
We show that the security proof of the Bennett 1992 protocol over loss-free
channel in (K. Tamaki, M. Koashi, and N. Imoto, Phys. Rev. Lett. 90, 167904
(2003)) can be adapted to accommodate loss. We assumed that Bob's detectors
discriminate between single photon states on one hand and vacuum state or
multi-photon states on the other hand.Comment: 5 pages, 2 figures. We have presented this topic at QIPC 2003 as a
poster sessio
Unconditional Security of Three State Quantum Key Distribution Protocols
Quantum key distribution (QKD) protocols are cryptographic techniques with
security based only on the laws of quantum mechanics. Two prominent QKD schemes
are the BB84 and B92 protocols that use four and two quantum states,
respectively. In 2000, Phoenix et al. proposed a new family of three state
protocols that offers advantages over the previous schemes. Until now, an error
rate threshold for security of the symmetric trine spherical code QKD protocol
has only been shown for the trivial intercept/resend eavesdropping strategy. In
this paper, we prove the unconditional security of the trine spherical code QKD
protocol, demonstrating its security up to a bit error rate of 9.81%. We also
discuss on how this proof applies to a version of the trine spherical code QKD
protocol where the error rate is evaluated from the number of inconclusive
events.Comment: 4 pages, published versio
Security of quantum key distribution with imperfect devices
We prove the security of the Bennett-Brassard (BB84) quantum key distribution
protocol in the case where the source and detector are under the limited
control of an adversary. Our proof applies when both the source and the
detector have small basis-dependent flaws, as is typical in practical
implementations of the protocol. We derive a general lower bound on the
asymptotic key generation rate for weakly basis-dependent eavesdropping
attacks, and also estimate the rate in some special cases: sources that emit
weak coherent states with random phases, detectors with basis-dependent
efficiency, and misaligned sources and detectors.Comment: 22 pages. (v3): Minor changes. (v2): Extensively revised and
expanded. New results include a security proof for generic small flaws in the
source and the detecto
On the performance of two protocols: SARG04 and BB84
We compare the performance of BB84 and SARG04, the later of which was
proposed by V. Scarani et al., in Phys. Rev. Lett. 92, 057901 (2004).
Specifically, in this paper, we investigate SARG04 with two-way classical
communications and SARG04 with decoy states. In the first part of the paper, we
show that SARG04 with two-way communications can tolerate a higher bit error
rate (19.4% for a one-photon source and 6.56% for a two-photon source) than
SARG04 with one-way communications (10.95% for a one-photon source and 2.71%
for a two-photon source). Also, the upper bounds on the bit error rate for
SARG04 with two-way communications are computed in a closed form by considering
an individual attack based on a general measurement. In the second part of the
paper, we propose employing the idea of decoy states in SARG04 to obtain
unconditional security even when realistic devices are used. We compare the
performance of SARG04 with decoy states and BB84 with decoy states. We find
that the optimal mean-photon number for SARG04 is higher than that of BB84 when
the bit error rate is small. Also, we observe that SARG04 does not achieve a
longer secure distance and a higher key generation rate than BB84, assuming a
typical experimental parameter set.Comment: 48 pages, 10 figures, 1 column, changed Figs. 7 and
- …