Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations.

نویسندگان

  • Valerio Scarani
  • Antonio Acín
  • Grégoire Ribordy
  • Nicolas Gisin
چکیده

We introduce a new class of quantum key distribution protocols, tailored to be robust against photon number splitting (PNS) attacks. We study one of these protocols, which differs from the original protocol by Bennett and Brassard (BB84) only in the classical sifting procedure. This protocol is provably better than BB84 against PNS attacks at zero error.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Optimal pulse to generate non - classical photon states photon blockade

VIa The single photon character of nonclassical states of light that can be generated using photon blockade is analyzed for time domain operation. We show that improved single photon statistics (single photon around 85% with a multi-photon of 8%) can be obtained by adequately choosing the parameters (mainly amplitude and pulseduration) of the driving laser pulses. An alternative method, where t...

متن کامل

200km Decoy-state quantum key distribution with photon polarization

We demonstrate the decoy-state quantum key distribution over 200 km with photon polarization through optical fiber, by using superconducting single photon detector with a repetition rate of 320 Mega Hz and a dark count rate of lower than 1 Hz. Since we have used the polarization coding, the synchronization pulses can be run in a low frequency. The final key rate is 14.1 Hz. The experiment lasts...

متن کامل

Unconditionally secure quantum key distribution over 50km of satndard telecom fibre

We demonstrate a weak pulse quantum key distribution system using the BB84 protocol which is secure against all individual attacks, including photon number splitting. By carefully controlling the weak pulse intensity we demonstrate the maximum secure bit rate as a function of the fibre length. Unconditionally secure keys can be formed for standard telecom fibres exceeding 50 km in length. Intro...

متن کامل

Optimal Experimental Scheme for Practical BB84 Quantum Key Distribution Protocol with Weak Coherent Sources, Noisy and Lossy Channel

It is the first scheme which allows the detection apparatus to achieve the photon number of arriving signals. Moreover, quantum bit error rates (QBERs) of multiphoton pulses can also be achieved precisely. Thus, our method is sensitive to the photon number splitting and resending (PNSR) attack, i.e., the eavesdropper (Eve) replaces one photon of the multiphoton pulse by a false one and forwards...

متن کامل

Quantum Cryptography via Parametric Downconversion

The use of quantum bits (qubits) in cryptography holds the promise of secure cryptographic quantum key distribution schemes. It is based usually on single-photon polarization states. Unfortunately, the implemented “qubits” in the usual weak pulse experiments are not true two-level systems, and quantum key distribution based on these imperfect qubits is totally insecure in the presence of high (...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Physical review letters

دوره 92 5  شماره 

صفحات  -

تاریخ انتشار 2004