File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Article: Efficient quantum key distribution scheme and a proof of its unconditional security

TitleEfficient quantum key distribution scheme and a proof of its unconditional security
Authors
KeywordsKey distribution
Quantum computing
Quantum cryptography
Quantum information
Issue Date2005
PublisherSpringer New York LLC. The Journal's web site is located at http://link.springer.de/link/service/journals/00145/
Citation
Journal of Cryptology, 2005, v. 18 n. 2, p. 133-165 How to Cite?
AbstractWe devise a simple modification that essentially doubles the efficiency of the BB84 quantum key distribution scheme proposed by Bennett and Brassard.We also prove the security of our modified scheme against the most general eavesdropping attack that is allowed by the laws of physics. The first major ingredient of our scheme is the assignment of significantly different probabilities to the different polarization bases during both transmission and reception, thus reducing the fraction of discarded data. A second major ingredient of our scheme is a refined analysis of accepted data: We divide the accepted data into various subsets according to the basis employed and estimate an error rate for each subset separately. We then show that such a refined data analysis guarantees the security of our scheme against the most general eavesdropping strategy, thus generalizing Shor and Preskill's proof of security of BB84 to our new scheme. Until now, most proposed proofs of security of single-particle type quantum key distribution schemes have relied heavily upon the fact that the bases are chosen uniformly, randomly, and independently. Our proof removes this symmetry requirement. © 2004 International Association for Cryptologic Research.
Persistent Identifierhttp://hdl.handle.net/10722/80361
ISSN
2021 Impact Factor: 1.691
2020 SCImago Journal Rankings: 0.444
ISI Accession Number ID
References

 

DC FieldValueLanguage
dc.contributor.authorLo, HKen_HK
dc.contributor.authorChau, HFen_HK
dc.contributor.authorArdehali, Men_HK
dc.date.accessioned2010-09-06T08:05:36Z-
dc.date.available2010-09-06T08:05:36Z-
dc.date.issued2005en_HK
dc.identifier.citationJournal of Cryptology, 2005, v. 18 n. 2, p. 133-165en_HK
dc.identifier.issn0933-2790en_HK
dc.identifier.urihttp://hdl.handle.net/10722/80361-
dc.description.abstractWe devise a simple modification that essentially doubles the efficiency of the BB84 quantum key distribution scheme proposed by Bennett and Brassard.We also prove the security of our modified scheme against the most general eavesdropping attack that is allowed by the laws of physics. The first major ingredient of our scheme is the assignment of significantly different probabilities to the different polarization bases during both transmission and reception, thus reducing the fraction of discarded data. A second major ingredient of our scheme is a refined analysis of accepted data: We divide the accepted data into various subsets according to the basis employed and estimate an error rate for each subset separately. We then show that such a refined data analysis guarantees the security of our scheme against the most general eavesdropping strategy, thus generalizing Shor and Preskill's proof of security of BB84 to our new scheme. Until now, most proposed proofs of security of single-particle type quantum key distribution schemes have relied heavily upon the fact that the bases are chosen uniformly, randomly, and independently. Our proof removes this symmetry requirement. © 2004 International Association for Cryptologic Research.en_HK
dc.languageengen_HK
dc.publisherSpringer New York LLC. The Journal's web site is located at http://link.springer.de/link/service/journals/00145/en_HK
dc.relation.ispartofJournal of Cryptologyen_HK
dc.subjectKey distributionen_HK
dc.subjectQuantum computingen_HK
dc.subjectQuantum cryptographyen_HK
dc.subjectQuantum informationen_HK
dc.titleEfficient quantum key distribution scheme and a proof of its unconditional securityen_HK
dc.typeArticleen_HK
dc.identifier.emailChau, HF: hfchau@hku.hken_HK
dc.identifier.authorityChau, HF=rp00669en_HK
dc.description.naturelink_to_OA_fulltext-
dc.identifier.doi10.1007/s00145-004-0142-yen_HK
dc.identifier.scopuseid_2-s2.0-17444398022en_HK
dc.identifier.hkuros97670en_HK
dc.relation.referenceshttp://www.scopus.com/mlt/select.url?eid=2-s2.0-17444398022&selection=ref&src=s&origin=recordpageen_HK
dc.identifier.volume18en_HK
dc.identifier.issue2en_HK
dc.identifier.spage133en_HK
dc.identifier.epage165en_HK
dc.identifier.isiWOS:000228103800004-
dc.publisher.placeUnited Statesen_HK
dc.identifier.scopusauthoridLo, HK=7202085450en_HK
dc.identifier.scopusauthoridChau, HF=7005742276en_HK
dc.identifier.scopusauthoridArdehali, M=55397217500en_HK
dc.identifier.issnl0933-2790-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats