Information geometric security analysis of differential phase-shift quantum key distribution protocol

نویسندگان

  • Laszlo Gyongyosi
  • Sándor Imre
چکیده

This paper analyzes the information-theoretical security of the Differential Phase Shift (DPS) Quantum Key Distribution (QKD) protocol, using efficient computational information geometric algorithms. The DPS QKD protocol was introduced for practical reasons, since the earlier QKD schemes were too complicated to implement in practice. The DPS QKD protocol can be an integrated part of current network security applications, hence it’s practical implementation is much easier with the current optical devices and optical networks. The proposed algorithm could be a very valuable tool to answer the still open questions related to the security bounds of the DPS QKD protocol.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security of differential-phase-shift quantum key distribution against individual attacks

We derive a proof of security for the differential-phase-shift quantum key distribution protocol under the assumption that Eve is restricted to individual attacks. The security proof is derived by bounding the average collision probability, which leads directly to a bound on Eve’s mutual information on the final key. The security proof applies to realistic sources based on pulsed coherent light...

متن کامل

Security of differential quadrature phase shift quantum key distribution

The differential phase shift (DPS) protocol is one of the simplest quantum key distribution protocols for implementation. Despite its practical advantage, current security proofs for the DPS protocol lead to much lower key generation rates compared to the BB84 protocol. We prove the security of a variant of the DPS protocol, called differential quadrature phase shift (DQPS) protocol. In additio...

متن کامل

Practical Quantum Private Database Queries Based on Passive Round-Robin Differential Phase-shift Quantum Key Distribution

A novel quantum private database query protocol is proposed, based on passive round-robin differential phase-shift quantum key distribution. Compared with previous quantum private database query protocols, the present protocol has the following unique merits: (i) the user Alice can obtain one and only one key bit so that both the efficiency and security of the present protocol can be ensured, a...

متن کامل

Quantum key distribution with combined conjugate coding and information overloading

Most quantum key distribution schemes depend either on a form of conjugate coding or on the principle of putting more information into a quantum state than can possibly be read out with a measurement. We construct a scheme that combines both these approaches. It is built from Round-Robin Differential Phase Shift (RRDPS) and Unclonable Encryption. Compared to RRDPS and BB84-like protocols our sc...

متن کامل

Quantum Key Distribution with Multi Letter Phase-Shift Keying

We present a new protocol for quantum key distribution using discrete phase-shift encoding with continuous variables. The novelty of the protocol is multi letter alphabets represented by coherent states of light with fixed amplitude and variable phase. Information is encoded in the phase of a coherent states which can be chosen from a regular discrete set consisting of an arbitrary number of le...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Security and Communication Networks

دوره 6  شماره 

صفحات  -

تاریخ انتشار 2013