45 research outputs found
Secure Deterministic Communication Without Entanglement
We propose a protocol for deterministic communication that does not make use
of entanglement. It exploits nonorthogonal states in a two-way quantum channel
attaining significant improvement of security and efficiency over already known
cryptographic protocols. The presented scheme, being deterministic, can be
devoted to direct communication as well as to key distribution, and its
experimental realization is feasible with present day technology.Comment: 4 pages, 2 figures. Corrected typos in the field "Authors"; added one
referenc
Security of two-way quantum key distribution
Quantum key distribution protocols typically make use of a one-way quantum
channel to distribute a shared secret string to two distant users. However,
protocols exploiting a two-way quantum channel have been proposed as an
alternative route to the same goal, with the potential advantage of
outperforming one-way protocols. Here we provide a strategy to prove security
for two-way quantum key distribution protocols against the most general quantum
attack possible by an eavesdropper. We utilize an entropic uncertainty
relation, and only a few assumptions need to be made about the devices used in
the protocol. We also show that a two-way protocol can outperform comparable
one-way protocols.Comment: 10 pages, 5 figure
Compensating the Noise of a Communication Channel via Asymmetric Encoding of Quantum Information
An asymmetric preparation of the quantum states sent through a noisy channel
can enable a new way to monitor and actively compensate the channel noise. The
paradigm of such an asymmetric treatment of quantum information is the Bennett
1992 protocol, in which the ratio between conclusive and inconclusive counts is
in direct connection with the channel noise. Using this protocol as a guiding
example, we show how to correct the phase drift of a communication channel
without using reference pulses, interruptions of the quantum transmission or
public data exchanges.Comment: 5 pages, 3 figure
Decoy-state quantum key distribution with a leaky source
In recent years, there has been a great effort to prove the security of quantum key distribution (QKD) with a minimum number of assumptions. Besides its intrinsic theoretical interest, this would allow for larger tolerance against device imperfections in the actual implementations. However, even in this device-independent scenario, one assumption seems unavoidable, that is, the presence of a protected space devoid of any unwanted information leakage in which the legitimate parties can privately generate, process and store their classical data. In this paper we relax this unrealistic and hardly feasible assumption and introduce a general formalism to tackle the information leakage problem in most of existing QKD systems. More specifically, we prove the security of optical QKD systems using phase and intensity modulators in their transmitters, which leak the setting information in an arbitrary manner. We apply our security proof to cases of practical interest and show key rates similar to those obtained in a perfectly shielded environment. Our work constitutes a fundamental step forward in guaranteeing implementation security of quantum communication systems
Robust Unconditionally Secure Quantum Key Distribution with Two Nonorthogonal and Uninformative States
We introduce a novel form of decoy-state technique to make the single-photon
Bennett 1992 protocol robust against losses and noise of a communication
channel. Two uninformative states are prepared by the transmitter in order to
prevent the unambiguous state discrimination attack and improve the phase-error
rate estimation. The presented method does not require strong reference pulses,
additional electronics or extra detectors for its implementation.Comment: 7 pages, 2 figure
Practical security bounds against the Trojan-horse attack in quantum key distribution
In the quantum version of a Trojan-horse attack, photons are injected into
the optical modules of a quantum key distribution system in an attempt to read
information direct from the encoding devices. To stop the Trojan photons, the
use of passive optical components has been suggested. However, to date, there
is no quantitative bound that specifies such components in relation to the
security of the system. Here, we turn the Trojan-horse attack into an
information leakage problem. This allows us quantify the system security and
relate it to the specification of the optical elements. The analysis is
supported by the experimental characterization, within the operation regime, of
reflectivity and transmission of the optical components most relevant to
security.Comment: 18 pages, 11 figures. Some typos correcte