File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1088/1367-2630/12/2/023024
- Scopus: eid_2-s2.0-77649166917
- WOS: WOS:000274749300005
- Find via
Supplementary
- Citations:
- Appears in Collections:
Article: Security analysis of an untrusted source for quantum key distribution: Passive approach
Title | Security analysis of an untrusted source for quantum key distribution: Passive approach |
---|---|
Authors | |
Issue Date | 2010 |
Citation | New Journal of Physics, 2010, v. 12, article no. 023024 How to Cite? |
Abstract | We present a passive approach to the security analysis of quantum key distribution (QKD) with an untrusted source. A complete proof of its unconditional security is also presented. This scheme has significant advantages in real-life implementations as it does not require fast optical switching or a quantum random number generator. The essential idea is to use a beam splitter to split each input pulse. We show that we can characterize the source using a cross-estimate technique without active routing of each pulse. We have derived analytical expressions for the passive estimation scheme. Moreover, using simulations, we have considered four real-life imperfections: additional loss introduced by the 'plug&play' structure, inefficiency of the intensity monitor noise of the intensity monitor, and statistical fluctuation introduced by finite data size. Our simulation results show that the passive estimate of an untrusted source remains useful in practice, despite these four imperfections. Also, we have performed preliminary experiments, confirming the utility of our proposal in real-life applications. Our proposal makes it possible to implement the 'plug&play' QKD with the security guaranteed, while keeping the implementation practical. © IOP Publishing Ltd and Deutsche Physikalische Gesellschaft. |
Persistent Identifier | http://hdl.handle.net/10722/285663 |
ISSN | 2023 Impact Factor: 2.8 2023 SCImago Journal Rankings: 1.090 |
ISI Accession Number ID |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Zhao, Yi | - |
dc.contributor.author | Qi, Bing | - |
dc.contributor.author | Lo, Hoi Kwong | - |
dc.contributor.author | Qian, Li | - |
dc.date.accessioned | 2020-08-18T04:56:19Z | - |
dc.date.available | 2020-08-18T04:56:19Z | - |
dc.date.issued | 2010 | - |
dc.identifier.citation | New Journal of Physics, 2010, v. 12, article no. 023024 | - |
dc.identifier.issn | 1367-2630 | - |
dc.identifier.uri | http://hdl.handle.net/10722/285663 | - |
dc.description.abstract | We present a passive approach to the security analysis of quantum key distribution (QKD) with an untrusted source. A complete proof of its unconditional security is also presented. This scheme has significant advantages in real-life implementations as it does not require fast optical switching or a quantum random number generator. The essential idea is to use a beam splitter to split each input pulse. We show that we can characterize the source using a cross-estimate technique without active routing of each pulse. We have derived analytical expressions for the passive estimation scheme. Moreover, using simulations, we have considered four real-life imperfections: additional loss introduced by the 'plug&play' structure, inefficiency of the intensity monitor noise of the intensity monitor, and statistical fluctuation introduced by finite data size. Our simulation results show that the passive estimate of an untrusted source remains useful in practice, despite these four imperfections. Also, we have performed preliminary experiments, confirming the utility of our proposal in real-life applications. Our proposal makes it possible to implement the 'plug&play' QKD with the security guaranteed, while keeping the implementation practical. © IOP Publishing Ltd and Deutsche Physikalische Gesellschaft. | - |
dc.language | eng | - |
dc.relation.ispartof | New Journal of Physics | - |
dc.title | Security analysis of an untrusted source for quantum key distribution: Passive approach | - |
dc.type | Article | - |
dc.description.nature | link_to_OA_fulltext | - |
dc.identifier.doi | 10.1088/1367-2630/12/2/023024 | - |
dc.identifier.scopus | eid_2-s2.0-77649166917 | - |
dc.identifier.volume | 12 | - |
dc.identifier.spage | article no. 023024 | - |
dc.identifier.epage | article no. 023024 | - |
dc.identifier.isi | WOS:000274749300005 | - |
dc.identifier.issnl | 1367-2630 | - |