File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Article: Security proof of a three-state quantum-key-distribution protocol without rotational symmetry

TitleSecurity proof of a three-state quantum-key-distribution protocol without rotational symmetry
Authors
Issue Date2006
Citation
Physical Review A - Atomic, Molecular, and Optical Physics, 2006, v. 74, n. 4, article no. 042342 How to Cite?
AbstractStandard security proofs of quantum-key-distribution (QKD) protocols often rely on symmetry arguments. In this paper, we prove the security of a three-state protocol that does not possess rotational symmetry. The three-state QKD protocol we consider involves three qubit states, where the first two states | 0z and | 1z can contribute to key generation, and the third state + = ( 0z + 1z ) /2 is for channel estimation. This protocol has been proposed and implemented experimentally in some frequency-based QKD systems where the three states can be prepared easily. Thus, by founding on the security of this three-state protocol, we prove that these QKD schemes are, in fact, unconditionally secure against any attacks allowed by quantum mechanics. The main task in our proof is to upper bound the phase error rate of the qubits given the bit error rates observed. Unconditional security can then be proved not only for the ideal case of a single-photon source and perfect detectors, but also for the realistic case of a phase-randomized weak coherent light source and imperfect threshold detectors. Our result in the phase error rate upper bound is independent of the loss in the channel. Also, we compare the three-state protocol with the Bennett-Brassard 1984 (BB84) protocol. For the single-photon source case, our result proves that the BB84 protocol strictly tolerates a higher quantum bit error rate than the three-state protocol, while for the coherent-source case, the BB84 protocol achieves a higher key generation rate and secure distance than the three-state protocol when a decoy-state method is used. © 2006 The American Physical Society.
Persistent Identifierhttp://hdl.handle.net/10722/285909
ISSN
2014 Impact Factor: 2.808
ISI Accession Number ID

 

DC FieldValueLanguage
dc.contributor.authorFung, Chi Hang Fred-
dc.contributor.authorLo, Hoi Kwong-
dc.date.accessioned2020-08-18T04:56:58Z-
dc.date.available2020-08-18T04:56:58Z-
dc.date.issued2006-
dc.identifier.citationPhysical Review A - Atomic, Molecular, and Optical Physics, 2006, v. 74, n. 4, article no. 042342-
dc.identifier.issn1050-2947-
dc.identifier.urihttp://hdl.handle.net/10722/285909-
dc.description.abstractStandard security proofs of quantum-key-distribution (QKD) protocols often rely on symmetry arguments. In this paper, we prove the security of a three-state protocol that does not possess rotational symmetry. The three-state QKD protocol we consider involves three qubit states, where the first two states | 0z and | 1z can contribute to key generation, and the third state + = ( 0z + 1z ) /2 is for channel estimation. This protocol has been proposed and implemented experimentally in some frequency-based QKD systems where the three states can be prepared easily. Thus, by founding on the security of this three-state protocol, we prove that these QKD schemes are, in fact, unconditionally secure against any attacks allowed by quantum mechanics. The main task in our proof is to upper bound the phase error rate of the qubits given the bit error rates observed. Unconditional security can then be proved not only for the ideal case of a single-photon source and perfect detectors, but also for the realistic case of a phase-randomized weak coherent light source and imperfect threshold detectors. Our result in the phase error rate upper bound is independent of the loss in the channel. Also, we compare the three-state protocol with the Bennett-Brassard 1984 (BB84) protocol. For the single-photon source case, our result proves that the BB84 protocol strictly tolerates a higher quantum bit error rate than the three-state protocol, while for the coherent-source case, the BB84 protocol achieves a higher key generation rate and secure distance than the three-state protocol when a decoy-state method is used. © 2006 The American Physical Society.-
dc.languageeng-
dc.relation.ispartofPhysical Review A - Atomic, Molecular, and Optical Physics-
dc.titleSecurity proof of a three-state quantum-key-distribution protocol without rotational symmetry-
dc.typeArticle-
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.doi10.1103/PhysRevA.74.042342-
dc.identifier.scopuseid_2-s2.0-33750572863-
dc.identifier.volume74-
dc.identifier.issue4-
dc.identifier.spagearticle no. 042342-
dc.identifier.epagearticle no. 042342-
dc.identifier.eissn1094-1622-
dc.identifier.isiWOS:000241723100065-
dc.identifier.issnl1050-2947-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats