Security of two-way quantum key distribution

被引:64
作者
Beaudry, Normand J. [1 ]
Lucamarini, Marco [2 ]
Mancini, Stefano [3 ]
Renner, Renato [1 ]
机构
[1] ETH, Inst Theoret Phys, CH-8093 Zurich, Switzerland
[2] Toshiba Res Europe Ltd, Cambridge Res Lab, Cambridge CB4 0GZ, England
[3] Univ Camerino, Sch Sci & Technol, I-62032 Camerino, Italy
来源
PHYSICAL REVIEW A | 2013年 / 88卷 / 06期
基金
欧洲研究理事会;
关键词
IMPLEMENTATION; COMMUNICATION; PROTOCOL;
D O I
10.1103/PhysRevA.88.062302
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
Quantum key distribution protocols typically make use of a one-way quantum channel to distribute a shared secret string to two distant users. However, protocols exploiting a two-way quantum channel have been proposed as an alternative route to the same goal, with the potential advantage of outperforming one-way protocols. Here we provide a strategy to prove security for two-way quantum key distribution protocols against the most general quantum attack possible by an eavesdropper. We utilize an entropic uncertainty relation, and only a few assumptions need to be made about the devices used in the protocol. We also show that a two-way protocol can outperform comparable one-way protocols.
引用
收藏
页数:9
相关论文
共 40 条
[1]  
[Anonymous], 2001, LECT NOTES COMPUTER
[2]  
[Anonymous], 2012, THESIS ETH ZURICH
[3]   No signaling and quantum key distribution [J].
Barrett, J ;
Hardy, L ;
Kent, A .
PHYSICAL REVIEW LETTERS, 2005, 95 (01)
[4]   Unconditionally secure device-independent quantum key distribution with only two devices [J].
Barrett, Jonathan ;
Colbeck, Roger ;
Kent, Adrian .
PHYSICAL REVIEW A, 2012, 86 (06)
[5]  
Bennett C. H., 2014, Theoretical computer science, P175, DOI [DOI 10.1016/J.TCS.2014.05.025, 10.1016/j.tcs.2014.05.025]
[6]   COMMUNICATION VIA ONE-PARTICLE AND 2-PARTICLE OPERATORS ON EINSTEIN-PODOLSKY-ROSEN STATES [J].
BENNETT, CH ;
WIESNER, SJ .
PHYSICAL REVIEW LETTERS, 1992, 69 (20) :2881-2884
[7]   The uncertainty principle in the presence of quantum memory [J].
Berta, Mario ;
Christandl, Matthias ;
Colbeck, Roger ;
Renes, Joseph M. ;
Renner, Renato .
NATURE PHYSICS, 2010, 6 (09) :659-662
[8]   Deterministic secure direct communication using entanglement -: art. no. 187902 [J].
Boström, K ;
Felbinger, T .
PHYSICAL REVIEW LETTERS, 2002, 89 (18) :187902/1-187902/4
[9]   Improving the capacity of the Bostrom-Felbinger protocol [J].
Cai, QY ;
Li, BW .
PHYSICAL REVIEW A, 2004, 69 (05) :054301-1
[10]   The "ping-pong" protocol can be attacked without eavesdropping [J].
Cai, QY .
PHYSICAL REVIEW LETTERS, 2003, 91 (10)