Measurement-device-independenization of quantum key distribution protocols

被引:5
作者
Shu, Hao [1 ,2 ]
机构
[1] Shenzhen Univ, Shenzhen, Peoples R China
[2] South China Univ Technol, Guangzhou, Peoples R China
关键词
Quantum key distribution; Measure-device-independent; Qubit; Photon number adding; Photon number purification; CRYPTOGRAPHY; STATE;
D O I
10.1016/j.cjph.2023.06.019
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Quantum key distribution (QKD) allows the legitimate partner to establish a secret key whose security only depends on physical laws. In recent years, research on QKD by employing insecure measurement devices, namely measurement-device-independent QKD (MDI-QKD) is increased. MDI-QKD removes all attacks on measurement devices and thus an untrusted third party can be employed for measuring. However, a weakness of previous MDI-QKD protocols is the need for joint measurements such as Bell measurements whose efficiency is low in practice. On the other hand, can all QKD protocols become measurement-device-independent remains a problem. In this paper, we present a scheme making prepare-measure QKD protocols become MDI-QKD protocols, called & PRIME;measurement-device-independenization & PRIME;, which does not need to employ joint measurements and could be efficiently implemented by weak coherence sources. The protocol might look like the detector-device-independent (DDI) protocols but it is also secure under the Trojan horse attack. To illustrate this, we investigate the photon-number-adding (PNA) attack and present a scheme, called & PRIME;photon - number - puri f ication & PRIME;, which can also be employed to close loopholes for previous protocols such as DDI and plug-and-play ones.
引用
收藏
页码:135 / 142
页数:8
相关论文
共 52 条
[1]   Device-independent security of quantum cryptography against collective attacks [J].
Acin, Antonio ;
Brunner, Nicolas ;
Gisin, Nicolas ;
Massar, Serge ;
Pironio, Stefano ;
Scarani, Valerio .
PHYSICAL REVIEW LETTERS, 2007, 98 (23)
[2]   Completely device-independent quantum key distribution [J].
Aguilar, Edgar A. ;
Ramanathan, Ravishankar ;
Kofler, Johannes ;
Pawlowski, Marcin .
PHYSICAL REVIEW A, 2016, 94 (02)
[3]   No signaling and quantum key distribution [J].
Barrett, J ;
Hardy, L ;
Kent, A .
PHYSICAL REVIEW LETTERS, 2005, 95 (01)
[4]   TELEPORTING AN UNKNOWN QUANTUM STATE VIA DUAL CLASSICAL AND EINSTEIN-PODOLSKY-ROSEN CHANNELS [J].
BENNETT, CH ;
BRASSARD, G ;
CREPEAU, C ;
JOZSA, R ;
PERES, A ;
WOOTTERS, WK .
PHYSICAL REVIEW LETTERS, 1993, 70 (13) :1895-1899
[5]   QUANTUM CRYPTOGRAPHY USING ANY 2 NONORTHOGONAL STATES [J].
BENNETT, CH .
PHYSICAL REVIEW LETTERS, 1992, 68 (21) :3121-3124
[6]   QUANTUM CRYPTOGRAPHY WITHOUT BELL THEOREM [J].
BENNETT, CH ;
BRASSARD, G ;
MERMIN, ND .
PHYSICAL REVIEW LETTERS, 1992, 68 (05) :557-559
[7]   Quantum cryptography: Public key distribution and coin tossing [J].
Bennett, Charles H. ;
Brassard, Gilles .
THEORETICAL COMPUTER SCIENCE, 2014, 560 :7-11
[8]   Efficient one- and two-qubit pulsed gates for an oscillator-stabilized Josephson qubit [J].
Brito, Frederico ;
DiVincenzo, David P. ;
Koch, Roger H. ;
Steffen, Matthias .
NEW JOURNAL OF PHYSICS, 2008, 10
[9]   Optimal eavesdropping in quantum cryptography with six states [J].
Bruss, D .
PHYSICAL REVIEW LETTERS, 1998, 81 (14) :3018-3021
[10]   Security of quantum key distribution using d-level systems -: art. no. 127902 [J].
Cerf, NJ ;
Bourennane, M ;
Karlsson, A ;
Gisin, N .
PHYSICAL REVIEW LETTERS, 2002, 88 (12) :4-127902