File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Article: Quantum key distribution with an unknown and untrusted source

TitleQuantum key distribution with an unknown and untrusted source
Authors
Issue Date2008
Citation
Physical Review A - Atomic, Molecular, and Optical Physics, 2008, v. 77, n. 5, article no. 052327 How to Cite?
AbstractThe security of a standard bidirectional "plug-and-play" quantum key distribution (QKD) system has been an open question for a long time. This is mainly because its source is equivalently controlled by an eavesdropper, which means the source is unknown and untrusted. Qualitative discussion on this subject has been made previously. In this paper, we solve this question directly by presenting the quantitative security analysis on a general class of QKD protocols whose sources are unknown and untrusted. The securities of standard Bennett-Brassard 1984 protocol, weak+vacuum decoy state protocol, and one-decoy state protocol, with unknown and untrusted sources are rigorously proved. We derive rigorous lower bounds to the secure key generation rates of the above three protocols. Our numerical simulation results show that QKD with an untrusted source gives a key generation rate that is close to that with a trusted source. © 2008 The American Physical Society.
Persistent Identifierhttp://hdl.handle.net/10722/285622
ISSN
2014 Impact Factor: 2.808
ISI Accession Number ID

 

DC FieldValueLanguage
dc.contributor.authorZhao, Yi-
dc.contributor.authorQi, Bing-
dc.contributor.authorLo, Hoi Kwong-
dc.date.accessioned2020-08-18T04:56:13Z-
dc.date.available2020-08-18T04:56:13Z-
dc.date.issued2008-
dc.identifier.citationPhysical Review A - Atomic, Molecular, and Optical Physics, 2008, v. 77, n. 5, article no. 052327-
dc.identifier.issn1050-2947-
dc.identifier.urihttp://hdl.handle.net/10722/285622-
dc.description.abstractThe security of a standard bidirectional "plug-and-play" quantum key distribution (QKD) system has been an open question for a long time. This is mainly because its source is equivalently controlled by an eavesdropper, which means the source is unknown and untrusted. Qualitative discussion on this subject has been made previously. In this paper, we solve this question directly by presenting the quantitative security analysis on a general class of QKD protocols whose sources are unknown and untrusted. The securities of standard Bennett-Brassard 1984 protocol, weak+vacuum decoy state protocol, and one-decoy state protocol, with unknown and untrusted sources are rigorously proved. We derive rigorous lower bounds to the secure key generation rates of the above three protocols. Our numerical simulation results show that QKD with an untrusted source gives a key generation rate that is close to that with a trusted source. © 2008 The American Physical Society.-
dc.languageeng-
dc.relation.ispartofPhysical Review A - Atomic, Molecular, and Optical Physics-
dc.titleQuantum key distribution with an unknown and untrusted source-
dc.typeArticle-
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.doi10.1103/PhysRevA.77.052327-
dc.identifier.scopuseid_2-s2.0-44149092178-
dc.identifier.volume77-
dc.identifier.issue5-
dc.identifier.spagearticle no. 052327-
dc.identifier.epagearticle no. 052327-
dc.identifier.eissn1094-1622-
dc.identifier.isiWOS:000257023900065-
dc.identifier.issnl1050-2947-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats