Quantum key distribution with untrusted detectors
نویسندگان
چکیده
منابع مشابه
Quantum key distribution with authentication
The security of the previous quantum key distribution (QKD) protocols, which is guaranteed by the nature of physics law, is based on the legitimate users. However, impersonation of the legitimate communicators by eavesdroppers, in practice, will be inevitable. In fact, the previous QKD protocols is un secure without authentication in practical communication. In this paper, we proposed an improv...
متن کاملQuantum key distribution with trusted quantum relay
A trusted quantum relay is introduced to enable quantum key distribution links to form the basic legs in a quantum key distribution network. The idea is based on the well-known intercept/resend eavesdropping. The same scheme can be used to make quantum key distribution between several parties. No entanglement is required.
متن کاملPassive scheme analysis for resolving an untrusted source problem in quantum key distribution
As a practical method, the passive scheme has been used to analyze the security of an untrusted source in quantum key distribution. In the passive scheme, one can utilize average-photon-number (APN) monitor, photon-number-distribution (PND) monitor and photon-number analyzer (PNA) to achieve the unconditional security with using BB84 protocol or decoy-state protocol. In this paper, the ClopperP...
متن کاملSecurity analysis of an untrusted source for quantum key distribution: passive approach
We present a passive approach to the security analysis of quantum key distribution (QKD) with an untrusted source. A complete proof of its unconditional security is also presented. This scheme has significant advantages in real-life implementations as it does not require fast optical switching or a quantum random number generator. The essential idea is to use a beam splitter to split each input...
متن کامل100 km differential phase shift quantum key distribution experiment with low jitter up-conversion detectors.
We present a quantum key distribution experiment in which keys that were secure against all individual eavesdropping attacks allowed by quantum mechanics were distributed over 100 km of optical fiber. We implemented the differential phase shift quantum key distribution protocol and used low timing jitter 1.55 microm single-photon detectors based on frequency up-conversion in periodically poled ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Physical Review A
سال: 2015
ISSN: 1050-2947,1094-1622
DOI: 10.1103/physreva.92.022337