Optimum Probe Parameters for Entangling Probe in Quantum Key Distribution

被引:15
|
作者
Brandt, Howard E. [1 ]
机构
[1] USA, Res Lab, Adelphi, MD 20783 USA
关键词
Quantum cryptography; quantum key distribution; quantum communication; quantum information processing;
D O I
10.1023/A:1025802616066
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
For the four-state protocol of quantum key distribution, optimum sets of probe parameters are calculated for the most general unitary probe in which each individual transmitted photon is made to interact with the probe so that the signal and the probe are left in an entangled state, and projective measurement by the probe, made subsequent to projective measurement by the legitimate receiver, yields information about the signal state. The probe optimization is based on maximizing the Renyi information gain by the probe on corrected data for a given error rate induced by the probe in the legitimate receiver. An arbitrary angle is included between the nonorthogonal linear polarization states of the signal photons. Two sets of optimum probe parameters are determined which both correspond to the same optimization. Also, a larger set of optimum probe parameters is found than was known previously for the standard BB84 protocol. A detailed comparison is made between the complete and incomplete optimizations, and the latter simpler optimization is also made complete. Also, the process of key distillation from the quantum transmission in quantum key distribution is reviewed, with the objective of calculating the secrecy capacity of the four-state protocol in the presence of the eavesdropping probe. Emphasis is placed on information leakage to the probe.
引用
收藏
页码:37 / 79
页数:43
相关论文
共 50 条
  • [31] Generalization of Quantum Key Distribution Protocol
    Khan, Muhammad Mubashir
    Xu, Jie
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2012, 12 (08): : 98 - 101
  • [32] INFORMATION RECONCILIATION FOR QUANTUM KEY DISTRIBUTION
    Elkouss, David
    Martinez-Mateo, Jesus
    Martin, Vicente
    QUANTUM INFORMATION & COMPUTATION, 2011, 11 (3-4) : 226 - 238
  • [33] Is quantum key distribution suitable for steganography?
    Fei Gao
    Bin Liu
    Wei-Wei Zhang
    Qiao-Yan Wen
    Hui Chen
    Quantum Information Processing, 2013, 12 : 625 - 630
  • [34] Continuous variable quantum key distribution
    Li, Yong-Min
    Wang, Xu-Yang
    Bai, Zeng-Liang
    Liu, Wen-Yuan
    Yang, Shen-Shen
    Peng, Kun-Chi
    CHINESE PHYSICS B, 2017, 26 (04)
  • [35] Circular type quantum key distribution
    Nishioka, T
    Ishizuka, H
    Hasegawa, T
    Abe, J
    IEEE PHOTONICS TECHNOLOGY LETTERS, 2002, 14 (04) : 576 - 578
  • [36] Quantum Key Distribution in Kubernetes Clusters
    Pedone, Ignazio
    Lioy, Antonio
    FUTURE INTERNET, 2022, 14 (06):
  • [37] DECOY STATE QUANTUM KEY DISTRIBUTION
    Ali, Sellami
    Saharudin, Suhairi
    Wahiddin, M. R. B.
    IIUM ENGINEERING JOURNAL, 2009, 10 (02): : 81 - 86
  • [38] Lightweight Authentication for Quantum Key Distribution
    Kiktenko, Evgeniy O.
    Malyshev, Aleksei O.
    Gavreev, Maxim A.
    Bozhedarov, Anton A.
    Pozhar, Nikolay O.
    Anufriev, Maxim N.
    Fedorov, Aleksey K.
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2020, 66 (10) : 6354 - 6368
  • [39] Lightweight mediated quantum key distribution
    Hwang T.
    Chen Y.-J.
    Tsai C.-W.
    Kuo C.-C.
    Chen M.-J.
    Optik, 2023, 287
  • [40] Is quantum key distribution suitable for steganography?
    Gao, Fei
    Liu, Bin
    Zhang, Wei-Wei
    Wen, Qiao-Yan
    Chen, Hui
    QUANTUM INFORMATION PROCESSING, 2013, 12 (01) : 625 - 630