Loss-tolerant prepare and measure quantum key distribution protocol

被引:3
作者
Mafu, Mhlambululi [1 ]
Sekga, Comfort [1 ]
Senekane, Makhamisa [2 ]
机构
[1] Botswana Int Univ Sci & Technol, Dept Phys & Astron, P Bag 16, Palapye, Botswana
[2] Univ Johannesburg, Inst Intelligent Syst, Corner Kingsway & Univ Rd, ZA-2092 Johannesburg, South Africa
关键词
Loss-tolerant; Quantum key distribution; Quantum non-demolition measurements; Finite key analysis; Photon-number splitting attacks; CRYPTOGRAPHY; SECURITY;
D O I
10.1016/j.sciaf.2021.e01008
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
We propose a modified version of the Bennett-Brassard 1984 quantum key distribution protocol intended to tolerate losses, certain forms of noise, and the so-called photon-number splitting attack. These are the issues facing the realization of practical quantum key distribution. The modified protocol is based on quantum non-demolition measurements for systems using weak coherent pulses. Our scheme ensures that emissions corresponding to zero photon pulses, multi-photon pulses, and detector double-clicks are discarded before sifting to improve sifting efficiency and increase the secret key rate. Moreover, we perform the finite key analysis to obtain the maximal achievable secret-key fraction and the corresponding optimal number of signals. Also, we compare our proposed protocol to the decoy-state quantum key distribution protocol. We observe that our proposed quantum key distribution scheme enables a more extended transmission distance than the decoy-state quantum key distribution protocol. Thus, this an advance in quantum communication because current limitations on quantum key distribution involve transmitting secret keys over more considerable distances in the presence of noise or losses in optical fibres. (C) 2021 The Author(s). Published by Elsevier B.V. on behalf of African Institute of Mathematical Sciences / Next Einstein Initiative.
引用
收藏
页数:8
相关论文
共 46 条
  • [1] [Anonymous], QUANTUM SAFE SECURIT
  • [2] Bachor H.-A., 2019, A Guide to Experiments in Quantum Optics
  • [3] Bennett C H., 1984, P IEEE INT C COMP SY, P175, DOI DOI 10.1016/J.TCS.2014.05.025
  • [4] QUANTUM CRYPTOGRAPHY USING ANY 2 NONORTHOGONAL STATES
    BENNETT, CH
    [J]. PHYSICAL REVIEW LETTERS, 1992, 68 (21) : 3121 - 3124
  • [5] Optimal eavesdropping in quantum cryptography with six states
    Bruss, D
    [J]. PHYSICAL REVIEW LETTERS, 1998, 81 (14) : 3018 - 3021
  • [6] Finite-key analysis for practical implementations of quantum key distribution
    Cai, Raymond Y. Q.
    Scarani, Valerio
    [J]. NEW JOURNAL OF PHYSICS, 2009, 11
  • [7] Heralded-qubit amplifiers for practical device-independent quantum key distribution
    Curty, Marcos
    Moroder, Tobias
    [J]. PHYSICAL REVIEW A, 2011, 84 (01)
  • [8] Elliott C, 2003, ACM SIGCOMM COMP COM, V33, P227
  • [9] Universal squash model for optical communications using linear optics and threshold detectors
    Fung, Chi-Hang Fred
    Chau, H. F.
    Lo, Hoi-Kwong
    [J]. PHYSICAL REVIEW A, 2011, 84 (02):
  • [10] Quantum cryptography
    Gisin, N
    Ribordy, GG
    Tittel, W
    Zbinden, H
    [J]. REVIEWS OF MODERN PHYSICS, 2002, 74 (01) : 145 - 195