Measurement-device-independenization of quantum key distribution protocols

被引:5
作者
Shu, Hao [1 ,2 ]
机构
[1] Shenzhen Univ, Shenzhen, Peoples R China
[2] South China Univ Technol, Guangzhou, Peoples R China
关键词
Quantum key distribution; Measure-device-independent; Qubit; Photon number adding; Photon number purification; CRYPTOGRAPHY; STATE;
D O I
10.1016/j.cjph.2023.06.019
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Quantum key distribution (QKD) allows the legitimate partner to establish a secret key whose security only depends on physical laws. In recent years, research on QKD by employing insecure measurement devices, namely measurement-device-independent QKD (MDI-QKD) is increased. MDI-QKD removes all attacks on measurement devices and thus an untrusted third party can be employed for measuring. However, a weakness of previous MDI-QKD protocols is the need for joint measurements such as Bell measurements whose efficiency is low in practice. On the other hand, can all QKD protocols become measurement-device-independent remains a problem. In this paper, we present a scheme making prepare-measure QKD protocols become MDI-QKD protocols, called & PRIME;measurement-device-independenization & PRIME;, which does not need to employ joint measurements and could be efficiently implemented by weak coherence sources. The protocol might look like the detector-device-independent (DDI) protocols but it is also secure under the Trojan horse attack. To illustrate this, we investigate the photon-number-adding (PNA) attack and present a scheme, called & PRIME;photon - number - puri f ication & PRIME;, which can also be employed to close loopholes for previous protocols such as DDI and plug-and-play ones.
引用
收藏
页码:135 / 142
页数:8
相关论文
共 52 条
  • [1] Device-independent security of quantum cryptography against collective attacks
    Acin, Antonio
    Brunner, Nicolas
    Gisin, Nicolas
    Massar, Serge
    Pironio, Stefano
    Scarani, Valerio
    [J]. PHYSICAL REVIEW LETTERS, 2007, 98 (23)
  • [2] Completely device-independent quantum key distribution
    Aguilar, Edgar A.
    Ramanathan, Ravishankar
    Kofler, Johannes
    Pawlowski, Marcin
    [J]. PHYSICAL REVIEW A, 2016, 94 (02)
  • [3] No signaling and quantum key distribution
    Barrett, J
    Hardy, L
    Kent, A
    [J]. PHYSICAL REVIEW LETTERS, 2005, 95 (01)
  • [4] TELEPORTING AN UNKNOWN QUANTUM STATE VIA DUAL CLASSICAL AND EINSTEIN-PODOLSKY-ROSEN CHANNELS
    BENNETT, CH
    BRASSARD, G
    CREPEAU, C
    JOZSA, R
    PERES, A
    WOOTTERS, WK
    [J]. PHYSICAL REVIEW LETTERS, 1993, 70 (13) : 1895 - 1899
  • [5] QUANTUM CRYPTOGRAPHY USING ANY 2 NONORTHOGONAL STATES
    BENNETT, CH
    [J]. PHYSICAL REVIEW LETTERS, 1992, 68 (21) : 3121 - 3124
  • [6] QUANTUM CRYPTOGRAPHY WITHOUT BELL THEOREM
    BENNETT, CH
    BRASSARD, G
    MERMIN, ND
    [J]. PHYSICAL REVIEW LETTERS, 1992, 68 (05) : 557 - 559
  • [7] Quantum cryptography: Public key distribution and coin tossing
    Bennett, Charles H.
    Brassard, Gilles
    [J]. THEORETICAL COMPUTER SCIENCE, 2014, 560 : 7 - 11
  • [8] Efficient one- and two-qubit pulsed gates for an oscillator-stabilized Josephson qubit
    Brito, Frederico
    DiVincenzo, David P.
    Koch, Roger H.
    Steffen, Matthias
    [J]. NEW JOURNAL OF PHYSICS, 2008, 10
  • [9] Optimal eavesdropping in quantum cryptography with six states
    Bruss, D
    [J]. PHYSICAL REVIEW LETTERS, 1998, 81 (14) : 3018 - 3021
  • [10] Security of quantum key distribution using d-level systems -: art. no. 127902
    Cerf, NJ
    Bourennane, M
    Karlsson, A
    Gisin, N
    [J]. PHYSICAL REVIEW LETTERS, 2002, 88 (12) : 4 - 127902