Mixed basis quantum key distribution with linear optics

被引:3
作者
Pavicic, Mladen [1 ,2 ]
Benson, Oliver [1 ]
Schell, Andreas W. [3 ]
Wolters, Janik [4 ]
机构
[1] Humboldt Univ, Nanoopt Math Nat Fak, Dept Phys, Berlin, Germany
[2] Rudjer Boskovic Inst, Ctr Excellence Adv Mat & Sensing Devices CEMS, Photon & Quantum Opt Unit, Zagreb, Croatia
[3] Kyoto Univ, Dept Elect Sci & Engn, Nishikyo Ku, Kyoto, Japan
[4] Univ Basel, Dept Phys, Basel, Switzerland
来源
OPTICS EXPRESS | 2017年 / 25卷 / 20期
关键词
PING-PONG; COMMUNICATION PROTOCOL; SECURITY; INTERFEROMETRY; PHOTONS;
D O I
10.1364/OE.25.023545
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
Two-qubit quantum codes have been suggested to obtain better efficiency and higher loss tolerance in quantum key distribution. Here, we propose a two-qubit quantum key distribution protocol based on a mixed basis consisting of two Bell states and two states from the computational basis. All states can be generated from a single entangled photon pair resource by using local operations on only one auxiliary photon. Compared to other schemes it is also possible to deterministically discriminate all states using linear optics. Additionally, our protocol can be implemented with today's technology. When discussing the security of our protocol we find a much improved resistance against certain attacks as compared to the standard BB84 protocol. (C) 2017 Optical Society of America
引用
收藏
页码:23545 / 23555
页数:11
相关论文
共 45 条
[1]  
[Anonymous], 1984, P IEEE INT C COMP, DOI DOI 10.1016/J.TCS.2014.05.025
[2]   Quantum cryptography using larger alphabets [J].
Bechmann-Pasquinucci, H ;
Tittel, W .
PHYSICAL REVIEW A, 2000, 61 (06) :6
[3]   On the security of the ping-pong protocol [J].
Bostroem, Kim ;
Felbinger, Timo .
PHYSICS LETTERS A, 2008, 372 (22) :3953-3956
[4]   Deterministic secure direct communication using entanglement -: art. no. 187902 [J].
Boström, K ;
Felbinger, T .
PHYSICAL REVIEW LETTERS, 2002, 89 (18) :187902/1-187902/4
[5]   Optimal eavesdropping in cryptography with three-dimensional quantum states [J].
Bruss, D ;
Macchiavello, C .
PHYSICAL REVIEW LETTERS, 2002, 88 (12) :4
[6]   Improving the capacity of the Bostrom-Felbinger protocol [J].
Cai, QY ;
Li, BW .
PHYSICAL REVIEW A, 2004, 69 (05) :054301-1
[7]   Secure direct communication based on ping-pong protocol [J].
Chamoli, Arti ;
Bhandari, C. M. .
QUANTUM INFORMATION PROCESSING, 2009, 8 (04) :347-356
[8]   Experimental demonstration on the deterministic quantum key distribution based on entangled photons [J].
Chen, Hua ;
Zhou, Zhi-Yuan ;
Zangana, Alaa Jabbar Jumaah ;
Yin, Zhen-Qiang ;
Wu, Juan ;
Han, Yun-Guang ;
Wang, Shuang ;
Li, Hong-Wei ;
He, De-Yong ;
Tawfeeq, Shelan Khasro ;
Shi, Bao-Sen ;
Guo, Guang-Can ;
Chen, Wei ;
Han, Zheng-Fu .
SCIENTIFIC REPORTS, 2016, 6
[9]  
Dusek M., 2006, PROGR OPTICS, V49, P257
[10]   Optimal eavesdropping in quantum cryptography .1. Information bound and optimal strategy [J].
Fuchs, CA ;
Gisin, N ;
Griffiths, RB ;
Niu, CS ;
Peres, A .
PHYSICAL REVIEW A, 1997, 56 (02) :1163-1172