File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Article: Security analysis of an untrusted source for quantum key distribution: Passive approach

TitleSecurity analysis of an untrusted source for quantum key distribution: Passive approach
Authors
Issue Date2010
Citation
New Journal of Physics, 2010, v. 12, article no. 023024 How to Cite?
AbstractWe present a passive approach to the security analysis of quantum key distribution (QKD) with an untrusted source. A complete proof of its unconditional security is also presented. This scheme has significant advantages in real-life implementations as it does not require fast optical switching or a quantum random number generator. The essential idea is to use a beam splitter to split each input pulse. We show that we can characterize the source using a cross-estimate technique without active routing of each pulse. We have derived analytical expressions for the passive estimation scheme. Moreover, using simulations, we have considered four real-life imperfections: additional loss introduced by the 'plug&play' structure, inefficiency of the intensity monitor noise of the intensity monitor, and statistical fluctuation introduced by finite data size. Our simulation results show that the passive estimate of an untrusted source remains useful in practice, despite these four imperfections. Also, we have performed preliminary experiments, confirming the utility of our proposal in real-life applications. Our proposal makes it possible to implement the 'plug&play' QKD with the security guaranteed, while keeping the implementation practical. © IOP Publishing Ltd and Deutsche Physikalische Gesellschaft.
Persistent Identifierhttp://hdl.handle.net/10722/285663
ISSN
2023 Impact Factor: 2.8
2023 SCImago Journal Rankings: 1.090
ISI Accession Number ID

 

DC FieldValueLanguage
dc.contributor.authorZhao, Yi-
dc.contributor.authorQi, Bing-
dc.contributor.authorLo, Hoi Kwong-
dc.contributor.authorQian, Li-
dc.date.accessioned2020-08-18T04:56:19Z-
dc.date.available2020-08-18T04:56:19Z-
dc.date.issued2010-
dc.identifier.citationNew Journal of Physics, 2010, v. 12, article no. 023024-
dc.identifier.issn1367-2630-
dc.identifier.urihttp://hdl.handle.net/10722/285663-
dc.description.abstractWe present a passive approach to the security analysis of quantum key distribution (QKD) with an untrusted source. A complete proof of its unconditional security is also presented. This scheme has significant advantages in real-life implementations as it does not require fast optical switching or a quantum random number generator. The essential idea is to use a beam splitter to split each input pulse. We show that we can characterize the source using a cross-estimate technique without active routing of each pulse. We have derived analytical expressions for the passive estimation scheme. Moreover, using simulations, we have considered four real-life imperfections: additional loss introduced by the 'plug&play' structure, inefficiency of the intensity monitor noise of the intensity monitor, and statistical fluctuation introduced by finite data size. Our simulation results show that the passive estimate of an untrusted source remains useful in practice, despite these four imperfections. Also, we have performed preliminary experiments, confirming the utility of our proposal in real-life applications. Our proposal makes it possible to implement the 'plug&play' QKD with the security guaranteed, while keeping the implementation practical. © IOP Publishing Ltd and Deutsche Physikalische Gesellschaft.-
dc.languageeng-
dc.relation.ispartofNew Journal of Physics-
dc.titleSecurity analysis of an untrusted source for quantum key distribution: Passive approach-
dc.typeArticle-
dc.description.naturelink_to_OA_fulltext-
dc.identifier.doi10.1088/1367-2630/12/2/023024-
dc.identifier.scopuseid_2-s2.0-77649166917-
dc.identifier.volume12-
dc.identifier.spagearticle no. 023024-
dc.identifier.epagearticle no. 023024-
dc.identifier.isiWOS:000274749300005-
dc.identifier.issnl1367-2630-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats