Mismatched Measurements and Quantum Key Distribution

نویسنده

  • Walter O. Krawec
چکیده

Introduction When designing quantum key distribution (QKD) protocols, measurement outcomes produced by an incompatible choice of basis are usually discarded by the protocol specification. However, it has been shown that these mismatched measurement outcomes can actually be useful in better determining E’s attack, leading potentially to an improved key-rate bound. For instance, in [1], it was shown that mismatched measurement outcomes can lead to an improved key-rate for the BB84 protocol under certain channels. In [2, 3], the three state BB84 was considered (originally introduced in [4]). This is a protocol where Alice (A) sends only |0〉 , |1〉 , or |+〉 = 1 √ 2 (|0〉+ |1〉) but never |−〉 = 1 √ 2 (|0〉 − |1〉) (thus, the users may not directly estimate the probability of E’s attacking flipping a |−〉 to a |+〉 as may be done in the standard BB84). Despite this limitation, however, it was proven that the use of mismatched measurement outcomes allows the three-state protocol to suffer the same amount of noise as the full BB84 protocol, namely 11%. In fact, the key-rate expression for both protocols is identical. Furthermore, and rather surprisingly, the choice of the third state was largely irrelevant; i.e., A need not send |+〉 but any state |a〉 = α |0〉 + √ 1− α2 |1〉 for α ∈ (0, 1) (and B measuring in the basis {|a〉 , |ā〉}, where 〈ā|a〉 = 0) assuming a symmetric attack the choice of α did not matter (it may, however, affect the key rate if imprecise estimation is performed [3]). Ref. [2] went further and also studied a modified four-state BB84 where A sends |0〉 , |1〉 , |+〉 , or |0Y 〉 = 1 2 (|0〉 + i |1〉). It was shown that this led to the same key-rate as the full six-state BB84 protocol, again assuming a symmetric channel. Recently, we have been developing a general framework from which to utilize mismatched measurement outcomes in the security proofs of arbitrary QKD protocols, extending the work we initially performed in [3]. We consider both one-way (where a qubit travels from A to B each iteration) and two-way protocols (where a qubit travels from A to B then back to A each iteration, thus passing through the adversary’s lab twice). We show that our technique adapts to both scenarios and can lead to greatly improved key rate bounds for a variety of protocols. We also do not assume symmetric attacks and instead derive key rate expressions for various QKD protocols which may be used for asymmetric channels (for example, where E’s attack flips a |0〉 with different probability than it would flip a |1〉). In fact, our key rate expressions utilize multiple noise parameters which may be estimated by the two users of the protocol.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Key Rate Available from Mismatched Mesurements in the BB 84 Protocol and the Uncertainty Principle ∗

SUMMARY We consider the mismatched measurements in the BB84 quantum key distribution protocol, in which measuring bases are different from transmitting bases. We give a lower bound on the amount of a secret key that can be extracted from the mismatched measurements. Our lower bound shows that we can extract a secret key from the mismatched measurements with certain quantum channels, such as the...

متن کامل

Key Rate Available from Mismatched Measurements in the BB84 Protocol and the Uncertainty Principle

We consider the mismatched measurements in the BB84 quantum key distribution protocol, in which measuring bases are different from transmitting bases. We give a lower bound on the amount of a secret key that can be extracted from the mismatched measurements. Our lower bound shows that we can extract a secret key from the mismatched measurements with certain quantum channels, such as the channel...

متن کامل

ua nt - p h / 05 11 13 0 v 1 1 4 N ov 2 00 5 Quantum key distribution without alternative measurements and rotations ⋆

A quantum key distribution protocol based on entanglement swapping is proposed. Through choosing particles by twos from the sequence and performing Bell measurements, two communicators can detect eavesdropping and obtain the secure key. Because the two particles measured together are selected out randomly, we need neither alternative measurements nor rotations of the Bell states to obtain secur...

متن کامل

Device-Independent Quantum Key Distribution with Commuting Measurements

We consider quantum key distribution in the device-independent scenario, i.e., where the legitimate parties do not know (or trust) the exact specification of their apparatus. We show how secure key distribution can be realized against the most general attacks by a quantum adversary under the condition that measurements on different subsystems by the honest parties commute.

متن کامل

Graphical Calculus for Quantum Key Distribution (Extended Abstract)

Controlled complementary measurements are key to quantum key distribution protocols, among many other things. We axiomatize controlled complementary measurements within symmetric monoidal categories, which provides them with a corresponding graphical calculus. We study the BB84 and Ekert91 protocols within this calculus, including the case where there is an interceptresend attack.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016