Structured codes improve the Bennett-Brassard-84 quantum key rate.
نویسندگان
چکیده
A central goal in information theory and cryptography is finding simple characterizations of optimal communication rates under various restrictions and security requirements. Ideally, the optimal key rate for a quantum key distribution (QKD) protocol would be given by a single-letter formula involving optimization over a single use of an effective channel. We explore the possibility of such a formula for the simplest and most widely used QKD protocol, Bennnett-Brassard-84 with one-way classical postprocessing. We show that a conjectured single-letter formula is false, uncovering a deep ignorance about good private codes and exposing unfortunate complications in the theory of QKD. These complications are not without benefit-with added complexity comes better key rates than previously thought possible. The threshold for secure key generation improves from a bit error rate of 0.124 to 0.129.
منابع مشابه
Simple proof of security of the BB84 quantum key distribution protocol
We prove that the 1984 protocol of Bennett and Brassard (BB84) for quantum key distribution is secure. We first give a key distribution protocol based on entanglement purification, which can be proven secure using methods from Lo and Chau's proof of security for a similar protocol. We then show that the security of this protocol implies the security of BB84. The entanglement purification based ...
متن کاملGeneralized privacy amplification
~ This paper provides a general treatment of privacy amplification by public discussion, a concept introduced by Bennett, Brassard and Robert [l] for a special scenario. The results have applications to unconditionally-secure secret-key agreement protocols, quantum cryptography and to a non-asymptotic and constructive treatment of the secrecy capacity of wire-tap and broadcast channels, even fo...
متن کاملSecurity of quantum key distribution with arbitrary individual imperfections
We consider the security of the Bennett-Brassard 1984 protocol for quantum key distribution, with arbitrary individual imperfections simultaneously in the source and detectors. We provide the secure key generation rate and show that three parameters must be bounded to ensure security; the basis dependence of the source, a detector-blinding parameter, and a detector leakage parameter. The system...
متن کاملSingle and Entangled Photon Sources
The possibility of totally secure communication through the application of quantum mechanical properties was introduced in 1984 by Bennett and Brassard in their paper, “Quantum Cryptography: Public Key Distribution and Coin Tossing”. As Bennett and Brassard outlined, quantum communication makes it impossible for an eavesdropper to intercept a message without detection by the desired parties. Th...
متن کاملQuantum Bit Commitment and Coin Tossing Protocols
In the late 1960’s a physicist, Stephen Wiesner, had the idea that the uncertainty principle could be used for cryptography (though he published his result much later [Wie83]). One of his ideas was that it would be possible to use a stream of polarized photons to transmit two messages in a way that would make only one of them readable at the receiver’s choosing. This notion, which he called “mu...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Physical review letters
دوره 100 17 شماره
صفحات -
تاریخ انتشار 2008