346 research outputs found

    Security of "Counterfactual Quantum Cryptography"

    Full text link
    Recently, a "counterfactual" quantum key distribution scheme was proposed by Tae-Gon Noh [1]. In this scheme, two legitimate distant peers may share secret keys even when the information carriers are not traveled in the quantum channel. We find that this protocol is equivalent to an entanglement distillation protocol (EDP). According to this equivalence, a strict security proof and the asymptotic key bit rate are both obtained when perfect single photon source is applied and Trojan-horse attack can be detected. We also find that the security of this scheme is deeply related with not only the bit error rate but also the yields of photons. And our security proof may shed light on security of other two-way protocols.Comment: 5 pages, 1 figur

    Security of modified Ping-Pong protocol in noisy and lossy channel

    Full text link
    The "Ping-Pong" (PP) protocol is a two-way quantum key protocol based on entanglement. In this protocol, Bob prepares one maximally entangled pair of qubits, and sends one qubit to Alice. Then, Alice performs some necessary operations on this qubit and sends it back to Bob. Although this protocol was proposed in 2002, its security in the noisy and lossy channel has not been proven. In this report, we add a simple and experimentally feasible modification to the original PP protocol, and prove the security of this modified PP protocol against collective attacks when the noisy and lossy channel is taken into account. Simulation results show that our protocol is practical.Comment: 7 pages, 2 figures, published in scientific report

    More randomness from a prepare-and-measure scenario with independent devices

    Full text link
    How to generate genuine quantum randomness from untrusted devices is an important problem in quantum information processing. Inspired by previous work on a self-testing quantum random number generator [T. Lunghi et al., Phys. Rev. Lett. 114, 150501 (2015)], we present a method to generate quantum randomness from a prepare-and-measure scenario with independent devices. In existing protocols, the quantum randomness depends only on a witness value (e.g., Clauser-Horne-Shimony-Holt value), which is calculated with the observed probabilities. Differently, here all the observed probabilities are directly used to calculate the min-entropy in our method. Through numerical simulation, we find that the min-entropy of our proposed scheme is higher than that in the previous work when a typical untrusted Bennett-Brassard 1984 (BB84) setup is used. Consequently, thanks to the proposed method, more genuine quantum random numbers may be obtained than before.Comment: 8 pages, 3 figure

    Detection efficiency and noise in semi-device independent randomness extraction protocol

    Full text link
    In this paper, we analyze several critical issues in semi-device independent quantum information processing protocol. In practical experimental realization randomness generation in that scenario is possible only if the efficiency of the detectors used is above a certain threshold. Our analysis shows that the critical detection efficiency is 0.7071 in the symmetric setup, while in the asymmetric setup if one of the bases has perfect critical detection efficiency then the other one can be arbitrarily close to 0. We also analyze the semi-device independent random number generation efficiency based on different averages of guessing probability. To generate more randomness, the proper averaging method should be applied. Its choice depends on the value of a certain dimension witness. More importantly, the general analytical relationship between the maximal average guessing probability and dimension witness is given

    Security of quantum key distribution with state-dependent imperfections

    Full text link
    In practical quantum key distribution (QKD) system, the state preparation and measurement are imperfect comparing with the ideal BB84 protocol, which are always state-dependent in practical realizations. If the state-dependent imperfections can not be regarded as an unitary transformation, it should not be considered as part of quantum channel noise introduced by the eavesdropper, the commonly used secret key rate formula GLLP can not be applied correspondingly. In this paper, the unconditional security of quantum key distribution with state-dependent imperfection has been analyzed by estimating the upper bound of the phase error rate about the quantum channel

    Security of practical phase-coding quantum key distribution

    Full text link
    Security proof of practical quantum key distribution (QKD) has attracted a lot of attentions in recent years. Most of real-life QKD implementations are based on phase-coding BB84 protocol, which usually uses Unbalanced Mach-Zehnder Interferometer (UMZI) as the information coder and decoder. However, the long arm and short arm of UMZI will introduce different loss in practical experimental realizations, the state emitted by Alice's side is nolonger standard BB84 states. In this paper, we will give a security analysis in this situation. Counterintuitively, active compensation for this different loss will only lower the secret key bit rate.Comment: 4 pages, 3 figures

    Quantum key distribution based on quantum dimension and independent devices

    Full text link
    In this paper, we propose a quantum key distribution (QKD) protocol based on only a two-dimensional Hilbert space encoding a quantum system and independent devices between the equipment for state preparation and measurement. Our protocol is inspired by the fully device-independent quantum key distribution (FDI-QKD) protocol and the measurement-device-independent quantum key distribution (MDI-QKD) protocol. Our protocol only requires the state to be prepared in the two dimensional Hilbert space, which weakens the state preparation assumption in the original MDI-QKD protocol. More interestingly, our protocol can overcome the detection loophole problem in the FDI-QKD protocol, which greatly limits the application of FDI-QKD. Hence our protocol can be implemented with practical optical components

    Characterizing high-quality high-dimensional quantum key distribution by state mapping between different degree of freedoms

    Full text link
    Quantum key distribution (QKD) guarantees the secure communication between legitimate parties with quantum mechanics. High-dimensional QKD (HDQKD) not only increases the secret key rate but also tolerates higher quantum bit error rate (QBER). Many HDQKD experiments have been realized by utilizing orbital-angular-momentum (OAM) photons as the degree of freedom (DOF) of OAM of the photon is a prospective resource for HD quantum information. In this work we proposed and characterized that a high-quality HDQKD based on polarization-OAM hybrid states can be realized by utilizing state mapping between different DOFs. Both the preparation and measurement procedures of the proof-of-principle verification experiment are simple and stable. Our experiment verified that (0.60±0.06)%(0.60\pm 0.06)\% QBER and 1.849±0.0081.849\pm 0.008 bits secret key rate per sifted signal can be achieved for a four-dimensional QKD with the weak coherent light source and decoy state method.Comment: 5 figures, 2 table

    Controlled-phase manipulation module for orbital-angular-momentum photon states

    Full text link
    Phase manipulation is essential to quantum information processing, for which the orbital angular momentum (OAM) of photon is a promising high-dimensional resource. Dove prism (DP) is one of the most important element to realize the nondestructive phase manipulation of OAM photons. DP usually changes the polarization of light and thus increases the manipulation error for a spin-OAM hybrid state. DP in a Sagnac interferometer also introduces a mode-dependent global phase to the OAM mode. In this work, we implemented a high-dimensional controlled-phase manipulation module (PMM), which can compensate the mode-dependent global phase and thus preserve the phase in the spin-OAM hybrid superposition state. The PMM is stable for free running and is suitable to realize the high-dimensional controlled-phase gate for spin-OAM hybrid states. Considering the Sagnac-based structure, the PMM is also suitable for classical communication with spin-OAM hybrid light field.Comment: 5 pages, 6 figure

    Proof-of-principle experimental realization of a qubit-like qudit-based quantum key distribution scheme

    Full text link
    In comparison to qubit-based protocols, qudit-based quantum key distribution (QKD) ones gen- erally allow two cooperative parties to share unconditionally secure keys under a higher channel noise. However, it is very hard to prepare and measure the required quantum states in qudit-based protocols in general. One exception is the recently proposed highly error tolerant qudit-based proto- col known as the Chau15 [1]. Remarkably, the state preparation and measurement in this protocol can be done relatively easily since the required states are phase encoded almost like the diagonal basis states of a qubit. Here we report the first proof-of-principle demonstration of the Chau15 protocol. One highlight of our experiment is that its post-processing is based on practical one-way manner, while the original proposal in Ref. [1] relies on complicated two-way post-processing, which is a great challenge in experiment. In addition, by manipulating time-bin qudit and measurement with a variable delay interferometer, our realization is extensible to qudit with high-dimensionality and confirms the experimental feasibility of the Chau15 protocol
    corecore