Security of quantum key distribution with entangled photons against individual attacks

被引:205
作者
Waks, E [1 ]
Zeevi, A
Yamamoto, Y
机构
[1] Stanford Univ, EL Ginzton Lab, JST,ICORP, Quantum Entanglement Project, Stanford, CA 94305 USA
[2] NTT Basic Res Labs, Kanagawa, Japan
来源
PHYSICAL REVIEW A | 2002年 / 65卷 / 05期
关键词
D O I
10.1103/PhysRevA.65.052310
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
We investigate the security of quantum key distribution with entangled photons, focusing on the two-photon variation of the Bennett-Brassard 1984 (BB84) protocol proposed in 1992 by Bennett, Brasard, and Mermin (BBM92). We present a proof of security which applies to realistic sources, and to untrustable sources which can be placed outside the labs of the two receivers. The proof is restricted to individual eavesdropping attacks, and assumes that the detection apparatus is trustable. We find that the average collision probability for the BBM92 protocol is the same as that of the BB84 protocol with an ideal single-photon source. This indicates that there is no analog in BBM92 to photon splitting attacks, and that the source can be placed between the two receivers without changing the form of the collision probability. We then compare the communication rate of both protocols as a function of distance, and show that BBM92 has potential for much longer communication distances, up to 170 km, in the presence of realistic experimental imperfections. Finally, we propose a scheme based on entanglement swapping that can lead to even longer distance communication. The limiting factor in this scheme is the channel loss, which imposes very slow communication rates at longer distances.
引用
收藏
页数:16
相关论文
共 40 条
[1]  
ASCHAUER H, QUANTPH0008051
[2]  
Bennett C. H., 1984, PROC IEEE INT C COMP, P175, DOI [DOI 10.1016/J.TCS.2014.05.025, 10.1016/j.tcs.2014.05.025]
[3]   Generalized privacy amplification [J].
Bennett, CH ;
Brassard, G ;
Crepeau, C ;
Maurer, UM .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1995, 41 (06) :1915-1923
[4]   QUANTUM CRYPTOGRAPHY USING ANY 2 NONORTHOGONAL STATES [J].
BENNETT, CH .
PHYSICAL REVIEW LETTERS, 1992, 68 (21) :3121-3124
[5]   QUANTUM CRYPTOGRAPHY WITHOUT BELL THEOREM [J].
BENNETT, CH ;
BRASSARD, G ;
MERMIN, ND .
PHYSICAL REVIEW LETTERS, 1992, 68 (05) :557-559
[6]   Regulated and entangled photons from a single quantum dot [J].
Benson, O ;
Santori, C ;
Pelton, M ;
Yamamoto, Y .
PHYSICAL REVIEW LETTERS, 2000, 84 (11) :2513-2516
[7]  
Biham E., 2000, Proceedings of the Thirty Second Annual ACM Symposium on Theory of Computing, P715, DOI 10.1145/335305.335406
[8]   Security of quantum cryptography against collective attacks [J].
Biham, E ;
Mor, T .
PHYSICAL REVIEW LETTERS, 1997, 78 (11) :2256-2259
[9]   Experiments on long wavelength (1550nm) "plug and play" quantum cryptography systems [J].
Bourennane, M ;
Gibson, F ;
Karlsson, A ;
Hening, A ;
Jonsson, P ;
Tsegaye, T ;
Ljunggren, D ;
Sundberg, E .
OPTICS EXPRESS, 1999, 4 (10) :383-387
[10]  
Brassard G., 1994, LECT NOTES COMPUTER, V765, P410, DOI [DOI 10.1007/3-540-48285-7_35, 10.1007/3-540-48285-7_35]