Security of quantum key distribution using weak coherent states with nonrandom phases
نویسندگان
چکیده
We prove the security of the Bennett-Brassard (BB84) quantum key distribution protocol in the case where the key information is encoded in the relative phase of a coherent-state reference pulse and a weak coherent-state signal pulse, as in some practical implementations of the protocol. In contrast to previous work, our proof applies even if the eavesdropper knows the phase of the reference pulse, provided that this phase is not modulated by the source, and even if the reference pulse is bright. The proof also applies to the case where the key is encoded in the photon polarization of a weak coherent-state pulse with a known phase, but only if the phases of the four BB84 signal states are judiciously chosen. The achievable key generation rate scales quadratically with the transmission in the channel, just as for BB84 with phase-randomized weak coherent-state signals (when decoy states are not used). For the case where the phase of the reference pulse is strongly modulated by the source, we exhibit an explicit attack that allows the eavesdropper to learn every key bit in a parameter regime where a protocol using phase-randomized signals is provably secure.
منابع مشابه
برهمنهی حالتهای همدوس غیرخطی روی سطح کره
In this paper, by using the nonlinear coherent states on a sphere, we introduce superposition of the aforementioned coherent states. Then, we consider quantum optical properties of these new superposed states and compare these properties with the corresponding properties of the nonlinear coherent states on the sphere. Specifically, we investigate their characteristics function, photon-number d...
متن کاملSecurity of quantum key distribution with coherent states and homodyne detection.
We assess the security of a quantum key distribution protocol relying on the transmission of Gaussian-modulated coherent states and homodyne detection. This protocol is shown to be equivalent to an entanglement purification protocol using CSS codes followed by key extraction, and is thus secure against any eavesdropping strategy.
متن کاملQuantum Key Distribution with Multi Letter Phase-Shift Keying
We present a new protocol for quantum key distribution using discrete phase-shift encoding with continuous variables. The novelty of the protocol is multi letter alphabets represented by coherent states of light with fixed amplitude and variable phase. Information is encoded in the phase of a coherent states which can be chosen from a regular discrete set consisting of an arbitrary number of le...
متن کاملQuantum key distribution using bright polarized coherent states
We propose a novel protocol for quantum key distribution based on the quantum polarization properties of coherent states. The key elements are encoded either in the component amplitude difference or in the phase difference of Gaussian-modulated strong coherent fields. The quantum counterpart (Stokes operators) of the classical parameters which represent the preponderance of xlinear polarization...
متن کاملSecurity proof of a three-state quantum key distribution protocol without rotational symmetry
Standard security proofs of quantum key distribution (QKD) protocols often rely on symmetry arguments. In this paper, we prove the security of a three-state protocol that does not possess rotational symmetry. The three-state QKD protocol we consider involves three qubit states, where the first two states, |0z〉 and |1z〉, can contribute to key generation and the third state, |+〉 = (|0z〉 + |1z〉)/ ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Quantum Information & Computation
دوره 7 شماره
صفحات -
تاریخ انتشار 2007