18 research outputs found

    Finite key size analysis of two-way quantum cryptography

    Get PDF
    Quantum cryptographic protocols solve the longstanding problem of distributing a shared secret string to two distant users by typically making use of one-way quantum channel. However, alternative protocols exploiting two-way quantum channel have been proposed for the same goal and with potential advantages. Here we overview a security proof for two-way quantum key distribution protocols, against the most general eavesdropping attack, that utilize an entropic uncertainty relation. Then, by resorting to the `smooth' version of involved entropies, we extend such a proof to the case of finite key size. The results will be compared to those available for one-way protocols showing some advantages

    Entropic Bounds For Unitary Testers and Mutually Unbiased Unitary Bases

    Get PDF
    We define the entropic bounds, i.e minimal uncertainty for pairs of unitary testers in distinguishing between unitary transformations not unlike the well known entropic bounds for observables. We show that in the case of specific sets of testers which pairwise saturate the trivial zero bound, the testers are all equivalent in the sense their statistics are the same. On the other hand, when maximal bounds are saturated by such sets of testers, the unitary operators would form unitary bases which are mutually unbiased. This resembles very much the role of mutually unbiased bases in maximizing the entropic bounds for observables. We show how such a bound can be useful in certain quantum cryptographic protocols.Comment: Added a more comprehensive background on testers and included some minor changes on notatio

    Entropic Bounds as Uncertainty Measure of Unitary Operators

    Full text link
    We reformulate the notion of uncertainty of pairs of unitary operators within the context of guessing games and derive an entropic uncertainty relation for a pair of such operators. We show how distinguishable operators are compatible while maximal incompatibility of unitary operators can be connected to bases for some subspace of operators which are mutually unbiased

    Nonorthogonal unitaries in two-way quantum key distribution

    No full text
    Two-way Quantum Key Distribution (QKD) schemes commonly make use of a set of unitaries corresponding to binary encodings which can in principle be distinguished perfectly. In this paper, inline with the proposal in Chiribella et al. (2008) [13], we introduce a non-entangled two-way QKD scheme with two sets of unitaries of which the elements in one set can be viewed as โ€˜nonorthogonalโ€™ to elements in the other with the aim of naturally suppressing an eavesdropper's information to provide for a higher security threshold. Security analysis is done in the context of individual attack strategies for a quick comparison with the conventional two-way QKD scheme. Given the richer structure of the improvement, future direction is also discussed

    Comment on new estimates of single photon parameters for setellite-based QKD

    No full text
    I comment on the results claiming to be new estimates for single photon parameters for satellite-based QKD in [1] to be based on a critical error in simple algebraic manipulations and further argue how their work would be more sensible upon the relevant corrections. However, this sensibility is at the price of rendering their conclusion nonjustifiable

    Indistinguishable encoding for bidirectional quantum key distribution: Theory to experiment

    No full text
    We present a bidirectional quantum key distribution protocol with minimal encoding operations derived from the use of only two โ€œnonorthogonalโ€ unitary transformations selected from two mutually unbiased unitary bases. Differently from many bidirectional protocols, these transformations are indistinguishable in principle for a single use. Along with its decoding procedure, it is unique compared to its โ€œorthogonal encodingโ€ predecessors. Given the nature of such protocols where key rates are usually dependent on two different types of error rates, we define a more relevant notion of security threshold for such protocols to allow for proper comparisons to be made. The current protocol outperforms its predecessor in terms of security as the amount of information an eavesdropper can glean is limited by the indistinguishability of the transformations. We further propose adaptations for a practical scenario and report on a proof of concept experimental scheme based on polarised photons from an attenuated pulsed laser for qubits, demonstrating the feasibility of such a protocol

    Optimal device independent quantum key distribution

    No full text
    We consider an optimal quantum key distribution setup based on minimal number of measurement bases with binary yields used by parties against an eavesdropper limited only by the no-signaling principle. We note that in general, the maximal key rate can be achieved by determining the optimal tradeoff between measurements that attain the maximal Bell violation and those that maximise the bit correlation between the parties. We show that higher correlation between shared raw keys at the expense of maximal Bell violation provide for better key rates for low channel disturbance

    Nonentagled qutrits in two way deterministic QKD

    No full text
    We consider the use of qutrits in a two way deterministic quantum cryptographic protocol which exhibits a higher level of security. We analyse the security of the protocol in the context of the Intercept Resend Strategy. The protocol which transmits a qutrit is naturally limited to not utilising all the available maximally overlapping basis due to a no go theorem not unlike the universal-NOT. We further propose another protocol to generalise the protocol above against the no-go theorem

    Improved two-way six-state protocol for quantum key distribution

    No full text
    A generalized version for a qubit based two-way quantum key distribution scheme was first proposed in the paper [Phys. Lett. A 358 (2006) 85] capitalizing on the six quantum states derived from three mutually unbiased bases. While boasting of a higher level of security, the protocol was not designed for ease of practical implementation. In this work, we propose modifications to the protocol, resulting not only in improved security but also in a more efficient and practical setup. We provide comparisons for calculated secure key rates for the protocols in noisy and lossy channels
    corecore