Security proof for Round Robin Differential Phase Shift QKD

نویسندگان

  • Daan Leermakers
  • Boris Skoric
چکیده

We give a security proof of the ‘Round Robin Differential Phase Shift’ Quantum Key Distribution scheme, and we give a tight bound on the required amount of privacy amplification. Our proof consists of the following steps. We construct an EPR variant of the scheme. We identify Eve’s optimal way of coupling an ancilla to an EPR qudit pair under the constraint that the bit error rate between Alice and Bob should not exceed a value β. As a function of β we derive, for finite key size, the trace distance between the real state and a state in which no leakage exists. For asymptotic key size we obtain a bound on the trace distance by computing the von Neumann entropy. Our asymptotic result for the privacy amplification is sharper than existing bounds.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A short note on the security of Round-Robin Differential Phase-Shift QKD

Round-Robin Differential Phase-Shift (RRDPS) is a Quantum Key Distribution (QKD) scheme proposed by Sasaki, Yamamoto and Koashi in 2014 [1]. It works with highdimensional quantum digits (qudits). Its main advantage is that it tolerates more noise than qubit-based schemes while being easy to implement. The security of RRDPS has been discussed in several papers [1, 2, 3]. However, these analyses ...

متن کامل

Round-robin differential-phase-shift quantum key distribution with a passive decoy state method

Recently, a new type of protocol named Round-robin differential-phase-shift quantum key distribution (RRDPS QKD) was proposed, where the security can be guaranteed without monitoring conventional signal disturbances. The active decoy state method can be used in this protocol to overcome the imperfections of the source. But, it may lead to side channel attacks and break the security of QKD syste...

متن کامل

Quantum key distribution protocol with slow basis change

In many quantum key distribution (QKD) protocols, the receiver has to randomly change a measurement basis for each pulse or each train of pulses. This random change requires us to generate a huge amount of random numbers. It is also cumbersome for some QKD protocols, such as the round-robin differential phase shift QKD protocol, to change the basis rapidly. In this presentation, we address thes...

متن کامل

ar X iv : 1 50 5 . 08 14 2 v 1 [ qu an t - ph ] 2 9 M ay 2 01 5 Experimental round - robin differential phase - shift quan - tum key distribution

In conventional quantum key distribution (QKD) protocols, security is guaranteed by estimating the amount of leaked information through monitoring signal disturbance, which, in practice, is generally caused by environmental noise and device imperfections rather than eavesdropping. Such estimation therefore tends to overrate the amount of leaked information in practice, leads to a fundamental th...

متن کامل

Information geometric security analysis of differential phase-shift quantum key distribution protocol

This paper analyzes the information-theoretical security of the Differential Phase Shift (DPS) Quantum Key Distribution (QKD) protocol, using efficient computational information geometric algorithms. The DPS QKD protocol was introduced for practical reasons, since the earlier QKD schemes were too complicated to implement in practice. The DPS QKD protocol can be an integrated part of current net...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2017  شماره 

صفحات  -

تاریخ انتشار 2017