A short note on the security of Round-Robin Differential Phase-Shift QKD
نویسنده
چکیده
Round-Robin Differential Phase-Shift (RRDPS) is a Quantum Key Distribution (QKD) scheme proposed by Sasaki, Yamamoto and Koashi in 2014 [1]. It works with highdimensional quantum digits (qudits). Its main advantage is that it tolerates more noise than qubit-based schemes while being easy to implement. The security of RRDPS has been discussed in several papers [1, 2, 3]. However, these analyses do not have the mathematical rigor that is customary in cryptology. In this short note we prove a simple result regarding the min-entropy of the distributed key; this may serve as a step towards a full security proof. 1 Preliminaries 1.1 The RRDPS scheme The dimension of the qudit space is d. The basis states are denoted as |0〉, . . . , |d− 1〉.1 Alice generates a random bitstring a ∈ {0, 1}d. She prepares the state |μ(a)〉 def = 1 √ d d−1 ∑
منابع مشابه
Round-robin differential-phase-shift quantum key distribution with a passive decoy state method
Recently, a new type of protocol named Round-robin differential-phase-shift quantum key distribution (RRDPS QKD) was proposed, where the security can be guaranteed without monitoring conventional signal disturbances. The active decoy state method can be used in this protocol to overcome the imperfections of the source. But, it may lead to side channel attacks and break the security of QKD syste...
متن کاملQuantum key distribution protocol with slow basis change
In many quantum key distribution (QKD) protocols, the receiver has to randomly change a measurement basis for each pulse or each train of pulses. This random change requires us to generate a huge amount of random numbers. It is also cumbersome for some QKD protocols, such as the round-robin differential phase shift QKD protocol, to change the basis rapidly. In this presentation, we address thes...
متن کاملSecurity proof for Round Robin Differential Phase Shift QKD
We give a security proof of the ‘Round Robin Differential Phase Shift’ Quantum Key Distribution scheme, and we give a tight bound on the required amount of privacy amplification. Our proof consists of the following steps. We construct an EPR variant of the scheme. We identify Eve’s optimal way of coupling an ancilla to an EPR qudit pair under the constraint that the bit error rate between Alice...
متن کاملar X iv : 1 50 5 . 08 14 2 v 1 [ qu an t - ph ] 2 9 M ay 2 01 5 Experimental round - robin differential phase - shift quan - tum key distribution
In conventional quantum key distribution (QKD) protocols, security is guaranteed by estimating the amount of leaked information through monitoring signal disturbance, which, in practice, is generally caused by environmental noise and device imperfections rather than eavesdropping. Such estimation therefore tends to overrate the amount of leaked information in practice, leads to a fundamental th...
متن کاملInformation geometric security analysis of differential phase-shift quantum key distribution protocol
This paper analyzes the information-theoretical security of the Differential Phase Shift (DPS) Quantum Key Distribution (QKD) protocol, using efficient computational information geometric algorithms. The DPS QKD protocol was introduced for practical reasons, since the earlier QKD schemes were too complicated to implement in practice. The DPS QKD protocol can be an integrated part of current net...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2017 شماره
صفحات -
تاریخ انتشار 2017