Quantum Key Distribution with a Control Key

被引:0
作者
Rehman, Junaid Ur [1 ]
Jeong, Youngmin [1 ,2 ]
Shin, Hyundong [1 ]
机构
[1] Kyung Hee Univ, Dept Elect & Radio Engn, Seoul, South Korea
[2] MIT, Lab Informat & Decis Syst, 77 Massachusetts Ave, Cambridge, MA 02139 USA
来源
2017 INTERNATIONAL SYMPOSIUM ON WIRELESS COMMUNICATION SYSTEMS (ISWCS) | 2017年
基金
新加坡国家研究基金会;
关键词
CRYPTOGRAPHY;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Quantum key distribution (QKD) relies on randomness to exchange secret keys among the communicating parties. While ensuring the secrecy of the keys being distributed, independent randomness also causes to reduce the number of key bits that can be shared per quantum signal exchanged. Recently it was shown that it is possible to use pseudo-randomness in place of true randomness in the QKD without compromising the integrity of a QKD scheme. By the virtue of a short secret key-called a control key-shared among the key sharing parties, same pseudo-randomness can be generated at the transmitter and the receiver end that allow to obtain a higher key exchange rate. However, there are certain modifications which are necessary before pseudo-randomness can be safely employed in a QKD procedure. In this paper, we provide a modification of QKD schemes for a secure use with the control key. We modify the prepare-and-measure (BB84) type, and measurement-device independent protocols. We then verify the advantages of use of control key in terms of key rates for the modification of two QKD schemes.
引用
收藏
页码:112 / 116
页数:5
相关论文
共 28 条
  • [1] [Anonymous], 1926, J AIEE
  • [2] [Anonymous], 1984, P IEEE INT C COMP, DOI DOI 10.1016/J.TCS.2014.05.025
  • [3] QUANTUM CRYPTOGRAPHY WITHOUT BELL THEOREM
    BENNETT, CH
    BRASSARD, G
    MERMIN, ND
    [J]. PHYSICAL REVIEW LETTERS, 1992, 68 (05) : 557 - 559
  • [4] Limitations on practical quantum cryptography
    Brassard, G
    Lütkenhaus, N
    Mor, T
    Sanders, BC
    [J]. PHYSICAL REVIEW LETTERS, 2000, 85 (06) : 1330 - 1333
  • [5] Unambiguous discrimination between linearly dependent states with multiple copies
    Chefles, A
    [J]. PHYSICAL REVIEW A, 2001, 64 (06): : 6
  • [6] QUANTUM CRYPTOGRAPHY BASED ON BELL THEOREM
    EKERT, AK
    [J]. PHYSICAL REVIEW LETTERS, 1991, 67 (06) : 661 - 663
  • [7] Trojan-horse attacks on quantum-key-distribution systems
    Gisin, N
    Fasel, S
    Kraus, B
    Zbinden, H
    Ribordy, G
    [J]. PHYSICAL REVIEW A, 2006, 73 (02):
  • [8] Quantum cryptography
    Gisin, N
    Ribordy, GG
    Tittel, W
    Zbinden, H
    [J]. REVIEWS OF MODERN PHYSICS, 2002, 74 (01) : 145 - 195
  • [9] Heisenberg W., 1927, Z. Phys, V43, P172, DOI [DOI 10.1007/BF01397280, 10.1007/BF01397280]
  • [10] Quantum key distribution with high loss: Toward global secure communication
    Hwang, WY
    [J]. PHYSICAL REVIEW LETTERS, 2003, 91 (05) : 579011 - 579014