Security Analysis of the Multi-photon Three-stage Quantum Key Distribution
نویسندگان
چکیده
This paper presents a multi-stage, multi-photon quantum key distribution protocol based on the double-lock cryptography. It exploits the asymmetry in the detection strategies between the legitimate users and the eavesdropper. The security analysis of the protocol is presented with coherent states under the interceptresend attack, the photon number splitting attack, and the man-in-the-middle attack. It is found that the mean photon number can be much larger 1. This complements the recent interest in multi-photon quantum communication protocols that require a pre-shared key between the legitimate users.
منابع مشابه
Physical Components Modeling in Quantum Key Distribution Towards Security Analysis
Quantum Key Distribution (QKD), based on fundamental principles of quantum mechanics, plays an irreplaceable role in national defense, financial and government affairs. Security analysis of QKD system is of great importance. However, existing studies on modeling QKD system are theory analysis based. In this paper, we propose a Simulation System of Physical Components (SSPC) in QKD system which ...
متن کاملComputationally secure multiple secret sharing: models, schemes, and formal security analysis
A multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants. in such a way a multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants, such that any authorized subset of participants can reconstruct the secrets. Up to now, existing MSSs either require too long shares for participants to be perfect secur...
متن کاملSecurity analysis of the time-coding quantum key distribution protocols
We report the security analysis of time-coding quantum key distribution protocols. The protocols make use of coherent single-photon pulses. The key is encoded in the photon time-detection. The use of coherent superposition of states allows to detect eavesdropping of the key. We give a mathematical model of a first protocol from which we derive a second, simpler, protocol. We derive the security...
متن کاملLarge alphabet quantum key distribution with two-mode coherently correlated beams
The large-alphabet quantum cryptography protocol based on the two-mode coherently correlated multi-photon beams is proposed. The alphabet extension for the protocol is shown to result in the increase of the QKD effectiveness and security. PACS numbers: 03.67.-a,03.67.Dd,03.67.Hk
متن کاملSecurity proof of a three-state quantum key distribution protocol without rotational symmetry
Standard security proofs of quantum key distribution (QKD) protocols often rely on symmetry arguments. In this paper, we prove the security of a three-state protocol that does not possess rotational symmetry. The three-state QKD protocol we consider involves three qubit states, where the first two states, |0z〉 and |1z〉, can contribute to key generation and the third state, |+〉 = (|0z〉 + |1z〉)/ ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2015