Security of differential-phase-shift quantum key distribution against individual attacks

نویسندگان

  • Edo Waks
  • Hiroki Takesue
  • Yoshihisa Yamamoto
چکیده

We derive a proof of security for the differential-phase-shift quantum key distribution protocol under the assumption that Eve is restricted to individual attacks. The security proof is derived by bounding the average collision probability, which leads directly to a bound on Eve’s mutual information on the final key. The security proof applies to realistic sources based on pulsed coherent light. We then compare individual attacks to sequential attacks and show that individual attacks are more powerful.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

100 km differential phase shift quantum key distribution experiment with low jitter up-conversion detectors.

We present a quantum key distribution experiment in which keys that were secure against all individual eavesdropping attacks allowed by quantum mechanics were distributed over 100 km of optical fiber. We implemented the differential phase shift quantum key distribution protocol and used low timing jitter 1.55 microm single-photon detectors based on frequency up-conversion in periodically poled ...

متن کامل

A Necessary Condition for the Security of Coherent- One-Way Quantum Key Distribution Protocol

The coherent-one-way and the differential-phase-shift protocols are two of the most recent practical quantum key distribution protocols for quantum cryptography. These protocols belong to a class of so-called distributed-phase-reference quantum key distribution protocols. While security proofs for some limited attacks exist, the unconditional security proofs this class of protocol remain unreal...

متن کامل

Quantum key distribution with combined conjugate coding and information overloading

Most quantum key distribution schemes depend either on a form of conjugate coding or on the principle of putting more information into a quantum state than can possibly be read out with a measurement. We construct a scheme that combines both these approaches. It is built from Round-Robin Differential Phase Shift (RRDPS) and Unclonable Encryption. Compared to RRDPS and BB84-like protocols our sc...

متن کامل

Information geometric security analysis of differential phase-shift quantum key distribution protocol

This paper analyzes the information-theoretical security of the Differential Phase Shift (DPS) Quantum Key Distribution (QKD) protocol, using efficient computational information geometric algorithms. The DPS QKD protocol was introduced for practical reasons, since the earlier QKD schemes were too complicated to implement in practice. The DPS QKD protocol can be an integrated part of current net...

متن کامل

Security of differential quadrature phase shift quantum key distribution

The differential phase shift (DPS) protocol is one of the simplest quantum key distribution protocols for implementation. Despite its practical advantage, current security proofs for the DPS protocol lead to much lower key generation rates compared to the BB84 protocol. We prove the security of a variant of the DPS protocol, called differential quadrature phase shift (DQPS) protocol. In additio...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005