Security of quantum key distribution with entangled photons against individual attacks
نویسندگان
چکیده
We investigate the security of quantum key distribution with entangled photons, focusing on the two-photon variation of the Bennett-Brassard 1984 ~BB84! protocol proposed in 1992 by Bennett, Brasard, and Mermin ~BBM92!. We present a proof of security which applies to realistic sources, and to untrustable sources which can be placed outside the labs of the two receivers. The proof is restricted to individual eavesdropping attacks, and assumes that the detection apparatus is trustable. We find that the average collision probability for the BBM92 protocol is the same as that of the BB84 protocol with an ideal single-photon source. This indicates that there is no analog in BBM92 to photon splitting attacks, and that the source can be placed between the two receivers without changing the form of the collision probability. We then compare the communication rate of both protocols as a function of distance, and show that BBM92 has potential for much longer communication distances, up to 170 km, in the presence of realistic experimental imperfections. Finally, we propose a scheme based on entanglement swapping that can lead to even longer distance communication. The limiting factor in this scheme is the channel loss, which imposes very slow communication rates at longer distances.
منابع مشابه
Finite-key analysis for time-energy high-dimensional quantum key distribution
Time-energy high-dimensional quantum key distribution (HD-QKD) leverages the high-dimensional nature of time-energy entangled biphotons and the loss tolerance from the discrete nature of single-photon detection thus enabling long-distance key distribution with high photon information efficiency (PIE). However, the security of HD-QKD has only been proven in the asymptotic regime, or in the finit...
متن کاملMixed basis quantum key distribution with linear optics
Two-qubit quantum codes have been suggested to obtain better efficiency and higher loss tolerance in quantum key distribution. Here, we propose a two-qubit quantum key distribution protocol based on a mixed basis consisting of two Bell states and two states from the computational basis. All states can be generated from a single entangled photon pair resource by using local operations on only on...
متن کاملEfficient quantum key distribution scheme with nonmaximally entangled states
We propose an efficient quantum key distribution scheme based on entanglement. The sender chooses pairs of photons in one of the two equivalent nonmaximally entangled states randomly, and sends a sequence of photons from each pair to the receiver. They choose from the various bases independently but with substantially different probabilities, thus reducing the fraction of discarded data, and a ...
متن کاملSecurity of Quantum Key Distribution with Entangled Qutrits
The study of quantum cryptography and quantum non-locality have traditionnally been based on two-level quantum systems (qubits). In this paper we consider a generalisation of Ekert’s cryptographic protocol[20] where qubits are replaced by qutrits. The security of this protocol is related to non-locality, in analogy with Ekert’s protocol. In order to study its robustness against the optimal indi...
متن کاملImplementation of continuous-variable quantum key distribution with composable and one-sided-device-independent security against coherent attacks
Secret communication over public channels is one of the central pillars of a modern information society. Using quantum key distribution this is achieved without relying on the hardness of mathematical problems, which might be compromised by improved algorithms or by future quantum computers. State-of-the-art quantum key distribution requires composable security against coherent attacks for a fi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2002