Asymptotically Optimal Prepare-Measure Quantum Key Distribution Protocol

被引:3
作者
Shu, Hao [1 ,2 ]
机构
[1] Shenzhen Univ, Shenzhen, Peoples R China
[2] South China Univ Technol, Guangzhou, Peoples R China
关键词
Quantum key distribution; Optimal bound; Qubit error rate; C-NOT attack; Optimal protocol; CRYPTOGRAPHY; SECURITY; STATE;
D O I
10.1007/s10773-023-05447-0
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Quantum key distribution (QKD) could be the most significant application of quantum information theory. In nearly four decades, although substantial QKD protocols are developed, the BB84 protocol and its variants are still the most researched ones. It is well-known that the secure bound of qubit error rate (QBER) of BB84 protocol is about 11% while it can be increased to 12.6% by six-state protocol. It would not be surprising that employing more basis could increase the bound. However, what is the optimal protocol, and how to analyze it? In this paper, investigations of asymptotically optimal QKD protocols are proposed. Precisely, We present an abstraction of prepare-measure QKD protocols and investigate two special cases which are optimal among all protocols coding by the same states. Our analysis demonstrates that the asymptotically optimal QBER bounds coding by orthogonal qubits are about 27.28% for both memory C-NOT attacks and memoryless C-NOT attacks while the bounds coding by non-orthogonal states in two mutually unbiased bases are about 22.73% for memory and 28.69% for memoryless C-NOT attacks. The protocols are idealized but might be asymptotically realized while their optimality indicates the ultimate potential of QKD protocols. Although the analysis only contains a special kind of attack, it provides a framework for investigating such protocols.
引用
收藏
页数:13
相关论文
共 38 条
[1]   Incoherent and coherent eavesdropping in the six-state protocol of quantum cryptography [J].
Bechmann-Pasquinucci, H ;
Gisin, N .
PHYSICAL REVIEW A, 1999, 59 (06) :4238-4248
[2]   Eavesdropping without quantum memory [J].
Bechmann-Pasquinucci, H .
PHYSICAL REVIEW A, 2006, 73 (04)
[3]  
Bennett C. H., 1992, Journal of Cryptology, V5, P3, DOI 10.1007/BF00191318
[4]   PRIVACY AMPLIFICATION BY PUBLIC DISCUSSION [J].
BENNETT, CH ;
BRASSARD, G ;
ROBERT, JM .
SIAM JOURNAL ON COMPUTING, 1988, 17 (02) :210-229
[5]   QUANTUM CRYPTOGRAPHY USING ANY 2 NONORTHOGONAL STATES [J].
BENNETT, CH .
PHYSICAL REVIEW LETTERS, 1992, 68 (21) :3121-3124
[6]   QUANTUM CRYPTOGRAPHY WITHOUT BELL THEOREM [J].
BENNETT, CH ;
BRASSARD, G ;
MERMIN, ND .
PHYSICAL REVIEW LETTERS, 1992, 68 (05) :557-559
[7]   Quantum cryptography: Public key distribution and coin tossing [J].
Bennett, Charles H. ;
Brassard, Gilles .
THEORETICAL COMPUTER SCIENCE, 2014, 560 :7-11
[8]   Optimal eavesdropping on quantum key distribution without quantum memory [J].
Bocquet, Aurelien ;
Alleaume, Romain ;
Leverrier, Anthony .
JOURNAL OF PHYSICS A-MATHEMATICAL AND THEORETICAL, 2012, 45 (02)
[9]   Quantum-cryptographic entangling probe [J].
Brandt, HE .
PHYSICAL REVIEW A, 2005, 71 (04)
[10]   Optimum Probe Parameters for Entangling Probe in Quantum Key Distribution [J].
Brandt, Howard E. .
QUANTUM INFORMATION PROCESSING, 2003, 2 (1-2) :37-79