Security of practical phase-coding quantum key distribution
نویسندگان
چکیده
Security proof of practical quantum key distribution (QKD) has attracted a lot of attentions in recent years. Most of real-life QKD implementations are based on phase-coding BB84 protocol, which usually uses Unbalanced Mach-Zehnder Interferometer (UMZI) as the information coder and decoder. However, the long arm and short arm of UMZI will introduce different loss in practical experimental realizations, the state emitted by Alice’s side is nolonger standard BB84 states. In this paper, we will give a security analysis in this situation. Counterintuitively, active compensation for this different loss will only lower the secret key bit rate.
منابع مشابه
Information geometric security analysis of differential phase-shift quantum key distribution protocol
This paper analyzes the information-theoretical security of the Differential Phase Shift (DPS) Quantum Key Distribution (QKD) protocol, using efficient computational information geometric algorithms. The DPS QKD protocol was introduced for practical reasons, since the earlier QKD schemes were too complicated to implement in practice. The DPS QKD protocol can be an integrated part of current net...
متن کاملQuantum key distribution with combined conjugate coding and information overloading
Most quantum key distribution schemes depend either on a form of conjugate coding or on the principle of putting more information into a quantum state than can possibly be read out with a measurement. We construct a scheme that combines both these approaches. It is built from Round-Robin Differential Phase Shift (RRDPS) and Unclonable Encryption. Compared to RRDPS and BB84-like protocols our sc...
متن کاملPractical Quantum Private Database Queries Based on Passive Round-Robin Differential Phase-shift Quantum Key Distribution
A novel quantum private database query protocol is proposed, based on passive round-robin differential phase-shift quantum key distribution. Compared with previous quantum private database query protocols, the present protocol has the following unique merits: (i) the user Alice can obtain one and only one key bit so that both the efficiency and security of the present protocol can be ensured, a...
متن کاملPractical Issues in Quantum Cryptography
Practical Issues in Quantum Cryptography Feihu Xu Master of Applied Science Graduate Department of Electrical & Computer Engineering University of Toronto 2012 Cryptography plays a key role in our life ranging from computer passwords to electronic commerce to national military security. The most widely used modern encryption algorithm is the public-key algorithm. However, the security of all pu...
متن کاملCompletely secure practical cryptography
Cryptography the art of secure communications, has been developed at least over 2500 years. Still at present, no perfectly secure as well as practically suitable classical or quantum cryptosystems exist. Statistically encoding the individual bit, here we present a practical key distribution technique which is absolutely secure both for classical and quantum keys. To achieve perfect security, no...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Quantum Information & Computation
دوره 10 شماره
صفحات -
تاریخ انتشار 2010