Security of high-dimensional quantum key distribution protocols using Franson interferometers

被引:42
作者
Brougham, Thomas [1 ]
Barnett, Stephen M. [1 ]
McCusker, Kevin T. [2 ,3 ]
Kwiat, Paul G. [2 ]
Gauthier, Daniel J. [4 ]
机构
[1] Univ Strathclyde, Dept Phys, Glasgow G4 0NG, Lanark, Scotland
[2] Univ Illinois, Dept Phys, Urbana, IL 61801 USA
[3] Northwestern Univ, Dept Elect Engn & Comp Sci, Evanston, IL 60208 USA
[4] Duke Univ, Dept Phys, Durham, NC 27708 USA
关键词
BELL THEOREM; CRYPTOGRAPHY; STATES; TIME; INFORMATION;
D O I
10.1088/0953-4075/46/10/104010
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
Franson interferometers are increasingly being proposed as a means of securing high-dimensional energy-time entanglement-based quantum key distribution (QKD) systems. Heuristic arguments have been proposed that purport to demonstrate the security of these schemes. We show, however, that such systems are vulnerable to attacks that localize the photons to several temporally separate locations. This demonstrates that a single pair of Franson interferometers is not a practical approach to securing high-dimensional energy-time entanglement-based QKD. This observation leads us to investigate the security of modified Franson-based-protocols, where Alice and Bob have two or more Franson interferometers. We show that such setups can improve the sensitivity against attacks that localize the photons to multiple temporal locations. While our results do not constitute a full security proof, they do show that a single pair of Franson interferometers is not secure and that multiple such interferometers could be a promising candidate for experimentally realizable high-dimensional QKD.
引用
收藏
页数:10
相关论文
共 43 条
[1]   Large-alphabet quantum key distribution using energy-time entangled bipartite states [J].
Ali-Khan, Irfan ;
Broadbent, Curtis J. ;
Howell, John C. .
PHYSICAL REVIEW LETTERS, 2007, 98 (06)
[2]  
[Anonymous], 2004, LECT NOTES PHYS
[3]  
Barnett S. M., 2009, Quantum Information
[4]   INFORMATION-THEORETIC LIMITS TO QUANTUM CRYPTOGRAPHY [J].
BARNETT, SM ;
PHOENIX, SJD .
PHYSICAL REVIEW A, 1993, 48 (01) :R5-R8
[5]   Generation of hyperentangled photon pairs [J].
Barreiro, JT ;
Langford, NK ;
Peters, NA ;
Kwiat, PG .
PHYSICAL REVIEW LETTERS, 2005, 95 (26)
[6]   Beating the channel capacity limit for linear photonic superdense coding [J].
Barreiro, Julio T. ;
Wei, Tzu-Chieh ;
Kwiat, Paul G. .
NATURE PHYSICS, 2008, 4 (04) :282-286
[7]  
Bennett C. H., 2014, Theoretical computer science, P175, DOI [DOI 10.1016/J.TCS.2014.05.025, 10.1016/j.tcs.2014.05.025]
[8]   QUANTUM CRYPTOGRAPHY USING ANY 2 NONORTHOGONAL STATES [J].
BENNETT, CH .
PHYSICAL REVIEW LETTERS, 1992, 68 (21) :3121-3124
[9]   QUANTUM CRYPTOGRAPHY WITHOUT BELL THEOREM [J].
BENNETT, CH ;
BRASSARD, G ;
MERMIN, ND .
PHYSICAL REVIEW LETTERS, 1992, 68 (05) :557-559
[10]   Quantum key distribution using multilevel encoding -: art. no. 012306 [J].
Bourennane, M ;
Karlsson, A ;
Björk, G .
PHYSICAL REVIEW A, 2001, 64 (01) :5