346 research outputs found
Security of "Counterfactual Quantum Cryptography"
Recently, a "counterfactual" quantum key distribution scheme was proposed by
Tae-Gon Noh [1]. In this scheme, two legitimate distant peers may share secret
keys even when the information carriers are not traveled in the quantum
channel. We find that this protocol is equivalent to an entanglement
distillation protocol (EDP). According to this equivalence, a strict security
proof and the asymptotic key bit rate are both obtained when perfect single
photon source is applied and Trojan-horse attack can be detected. We also find
that the security of this scheme is deeply related with not only the bit error
rate but also the yields of photons. And our security proof may shed light on
security of other two-way protocols.Comment: 5 pages, 1 figur
Security of modified Ping-Pong protocol in noisy and lossy channel
The "Ping-Pong" (PP) protocol is a two-way quantum key protocol based on
entanglement. In this protocol, Bob prepares one maximally entangled pair of
qubits, and sends one qubit to Alice. Then, Alice performs some necessary
operations on this qubit and sends it back to Bob. Although this protocol was
proposed in 2002, its security in the noisy and lossy channel has not been
proven. In this report, we add a simple and experimentally feasible
modification to the original PP protocol, and prove the security of this
modified PP protocol against collective attacks when the noisy and lossy
channel is taken into account. Simulation results show that our protocol is
practical.Comment: 7 pages, 2 figures, published in scientific report
More randomness from a prepare-and-measure scenario with independent devices
How to generate genuine quantum randomness from untrusted devices is an
important problem in quantum information processing. Inspired by previous work
on a self-testing quantum random number generator [T. Lunghi et al., Phys. Rev.
Lett. 114, 150501 (2015)], we present a method to generate quantum randomness
from a prepare-and-measure scenario with independent devices. In existing
protocols, the quantum randomness depends only on a witness value (e.g.,
Clauser-Horne-Shimony-Holt value), which is calculated with the observed
probabilities. Differently, here all the observed probabilities are directly
used to calculate the min-entropy in our method. Through numerical simulation,
we find that the min-entropy of our proposed scheme is higher than that in the
previous work when a typical untrusted Bennett-Brassard 1984 (BB84) setup is
used. Consequently, thanks to the proposed method, more genuine quantum random
numbers may be obtained than before.Comment: 8 pages, 3 figure
Detection efficiency and noise in semi-device independent randomness extraction protocol
In this paper, we analyze several critical issues in semi-device independent
quantum information processing protocol. In practical experimental realization
randomness generation in that scenario is possible only if the efficiency of
the detectors used is above a certain threshold. Our analysis shows that the
critical detection efficiency is 0.7071 in the symmetric setup, while in the
asymmetric setup if one of the bases has perfect critical detection efficiency
then the other one can be arbitrarily close to 0. We also analyze the
semi-device independent random number generation efficiency based on different
averages of guessing probability. To generate more randomness, the proper
averaging method should be applied. Its choice depends on the value of a
certain dimension witness. More importantly, the general analytical
relationship between the maximal average guessing probability and dimension
witness is given
Security of quantum key distribution with state-dependent imperfections
In practical quantum key distribution (QKD) system, the state preparation and
measurement are imperfect comparing with the ideal BB84 protocol, which are
always state-dependent in practical realizations. If the state-dependent
imperfections can not be regarded as an unitary transformation, it should not
be considered as part of quantum channel noise introduced by the eavesdropper,
the commonly used secret key rate formula GLLP can not be applied
correspondingly. In this paper, the unconditional security of quantum key
distribution with state-dependent imperfection has been analyzed by estimating
the upper bound of the phase error rate about the quantum channel
Security of practical phase-coding quantum key distribution
Security proof of practical quantum key distribution (QKD) has attracted a
lot of attentions in recent years. Most of real-life QKD implementations are
based on phase-coding BB84 protocol, which usually uses Unbalanced Mach-Zehnder
Interferometer (UMZI) as the information coder and decoder. However, the long
arm and short arm of UMZI will introduce different loss in practical
experimental realizations, the state emitted by Alice's side is nolonger
standard BB84 states. In this paper, we will give a security analysis in this
situation. Counterintuitively, active compensation for this different loss will
only lower the secret key bit rate.Comment: 4 pages, 3 figures
Quantum key distribution based on quantum dimension and independent devices
In this paper, we propose a quantum key distribution (QKD) protocol based on
only a two-dimensional Hilbert space encoding a quantum system and independent
devices between the equipment for state preparation and measurement. Our
protocol is inspired by the fully device-independent quantum key distribution
(FDI-QKD) protocol and the measurement-device-independent quantum key
distribution (MDI-QKD) protocol. Our protocol only requires the state to be
prepared in the two dimensional Hilbert space, which weakens the state
preparation assumption in the original MDI-QKD protocol. More interestingly,
our protocol can overcome the detection loophole problem in the FDI-QKD
protocol, which greatly limits the application of FDI-QKD. Hence our protocol
can be implemented with practical optical components
Characterizing high-quality high-dimensional quantum key distribution by state mapping between different degree of freedoms
Quantum key distribution (QKD) guarantees the secure communication between
legitimate parties with quantum mechanics. High-dimensional QKD (HDQKD) not
only increases the secret key rate but also tolerates higher quantum bit error
rate (QBER). Many HDQKD experiments have been realized by utilizing
orbital-angular-momentum (OAM) photons as the degree of freedom (DOF) of OAM of
the photon is a prospective resource for HD quantum information. In this work
we proposed and characterized that a high-quality HDQKD based on
polarization-OAM hybrid states can be realized by utilizing state mapping
between different DOFs. Both the preparation and measurement procedures of the
proof-of-principle verification experiment are simple and stable. Our
experiment verified that QBER and bits
secret key rate per sifted signal can be achieved for a four-dimensional QKD
with the weak coherent light source and decoy state method.Comment: 5 figures, 2 table
Controlled-phase manipulation module for orbital-angular-momentum photon states
Phase manipulation is essential to quantum information processing, for which
the orbital angular momentum (OAM) of photon is a promising high-dimensional
resource. Dove prism (DP) is one of the most important element to realize the
nondestructive phase manipulation of OAM photons. DP usually changes the
polarization of light and thus increases the manipulation error for a spin-OAM
hybrid state. DP in a Sagnac interferometer also introduces a mode-dependent
global phase to the OAM mode. In this work, we implemented a high-dimensional
controlled-phase manipulation module (PMM), which can compensate the
mode-dependent global phase and thus preserve the phase in the spin-OAM hybrid
superposition state. The PMM is stable for free running and is suitable to
realize the high-dimensional controlled-phase gate for spin-OAM hybrid states.
Considering the Sagnac-based structure, the PMM is also suitable for classical
communication with spin-OAM hybrid light field.Comment: 5 pages, 6 figure
Proof-of-principle experimental realization of a qubit-like qudit-based quantum key distribution scheme
In comparison to qubit-based protocols, qudit-based quantum key distribution
(QKD) ones gen- erally allow two cooperative parties to share unconditionally
secure keys under a higher channel noise. However, it is very hard to prepare
and measure the required quantum states in qudit-based protocols in general.
One exception is the recently proposed highly error tolerant qudit-based proto-
col known as the Chau15 [1]. Remarkably, the state preparation and measurement
in this protocol can be done relatively easily since the required states are
phase encoded almost like the diagonal basis states of a qubit. Here we report
the first proof-of-principle demonstration of the Chau15 protocol. One
highlight of our experiment is that its post-processing is based on practical
one-way manner, while the original proposal in Ref. [1] relies on complicated
two-way post-processing, which is a great challenge in experiment. In addition,
by manipulating time-bin qudit and measurement with a variable delay
interferometer, our realization is extensible to qudit with high-dimensionality
and confirms the experimental feasibility of the Chau15 protocol
- …