File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Article: Efficient quantum key distribution

TitleEfficient quantum key distribution
Authors
Issue Date1998
Citation
Hp Laboratories Technical Report, 1998 n. 98-29, p. 1-12 How to Cite?
AbstractWe devise a simple modification that essentially doubles the efficiency of a well-known quantum key distribution scheme proposed by Bennett and Brassard (BB84). Our scheme assigns significantly different probabilities for the different polarization bases during both transmission and reception to reduce the fraction of discarded data. The actual probabilities used in the scheme are announced in public. As the number of transmitted signals increases, the efficiency of our scheme can be made to approach 100%. An eavesdropper may try to break such a scheme by eavesdropping mainly along the predominant basis. To defeat such an attack, we perform a refined analysis of accepted data: instead of lumping all the accepted data together to estimate a single error rate, we separate the accepted data into various subsets according to the basis employed and estimate an error rate for each subset individually.
Persistent Identifierhttp://hdl.handle.net/10722/174756

 

DC FieldValueLanguage
dc.contributor.authorArdehali, Mohammeden_US
dc.contributor.authorBrassard, Gillesen_US
dc.contributor.authorChau, HFen_US
dc.contributor.authorLo, HoiKwongen_US
dc.date.accessioned2012-11-26T08:47:16Z-
dc.date.available2012-11-26T08:47:16Z-
dc.date.issued1998en_US
dc.identifier.citationHp Laboratories Technical Report, 1998 n. 98-29, p. 1-12en_US
dc.identifier.urihttp://hdl.handle.net/10722/174756-
dc.description.abstractWe devise a simple modification that essentially doubles the efficiency of a well-known quantum key distribution scheme proposed by Bennett and Brassard (BB84). Our scheme assigns significantly different probabilities for the different polarization bases during both transmission and reception to reduce the fraction of discarded data. The actual probabilities used in the scheme are announced in public. As the number of transmitted signals increases, the efficiency of our scheme can be made to approach 100%. An eavesdropper may try to break such a scheme by eavesdropping mainly along the predominant basis. To defeat such an attack, we perform a refined analysis of accepted data: instead of lumping all the accepted data together to estimate a single error rate, we separate the accepted data into various subsets according to the basis employed and estimate an error rate for each subset individually.en_US
dc.languageengen_US
dc.relation.ispartofHP Laboratories Technical Reporten_US
dc.titleEfficient quantum key distributionen_US
dc.typeArticleen_US
dc.identifier.emailChau, HF: hfchau@hku.hken_US
dc.identifier.authorityChau, HF=rp00669en_US
dc.description.naturelink_to_subscribed_fulltexten_US
dc.identifier.scopuseid_2-s2.0-0032001021en_US
dc.identifier.issue98-29en_US
dc.identifier.spage1en_US
dc.identifier.epage12en_US
dc.identifier.scopusauthoridArdehali, Mohammed=55397217500en_US
dc.identifier.scopusauthoridBrassard, Gilles=7003764522en_US
dc.identifier.scopusauthoridChau, HF=7005742276en_US
dc.identifier.scopusauthoridLo, HoiKwong=7202085450en_US

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats