Finite-key-size security of the Phoenix-Barnett-Chefles 2000 quantum-key-distribution protocol

被引:10
作者
Mafu, Mhlambululi [1 ]
Garapo, Kevin [1 ]
Petruccione, Francesco [1 ,2 ]
机构
[1] Univ KwaZulu Natal, Ctr Quantum Technol, Sch Chem & Phys, ZA-4000 Durban, South Africa
[2] Univ KwaZulu Natal, NITheP, ZA-4000 Durban, South Africa
来源
PHYSICAL REVIEW A | 2014年 / 90卷 / 03期
基金
新加坡国家研究基金会;
关键词
CRYPTOGRAPHY; STATES;
D O I
10.1103/PhysRevA.90.032308
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
The postselection technique was introduced by Christandl, Konig, and Renner [Phys. Rev. Lett. 102, 020504 (2009)] in order to simplify the security of quantum-key-distribution schemes. Here, we present how it can be applied to study the security of the Phoenix-Barnett-Chefles 2000 trine-state protocol, a symmetric version of the Bennett 1992 protocol.
引用
收藏
页数:5
相关论文
共 25 条
[1]   Quantum key distribution with finite resources: Secret key rates via Renyi entropies [J].
Abruzzo, Silvestre ;
Kampermann, Hermann ;
Mertz, Markus ;
Bruss, Dagmar .
PHYSICAL REVIEW A, 2011, 84 (03)
[2]  
[Anonymous], 1983, ACM SIGACT NEWS, DOI DOI 10.1145/1008908.1008920
[3]  
Bennett C. H., 2014, Theoretical computer science, P175, DOI [DOI 10.1016/J.TCS.2014.05.025, 10.1016/j.tcs.2014.05.025]
[4]   QUANTUM CRYPTOGRAPHY USING ANY 2 NONORTHOGONAL STATES [J].
BENNETT, CH .
PHYSICAL REVIEW LETTERS, 1992, 68 (21) :3121-3124
[5]   Unconditional security of a three state quantum key distribution protocol [J].
Boileau, JC ;
Tamaki, K ;
Batuwantudawe, J ;
Laflamme, R ;
Renes, JM .
PHYSICAL REVIEW LETTERS, 2005, 94 (04)
[6]   Optimal eavesdropping in quantum cryptography with six states [J].
Bruss, D .
PHYSICAL REVIEW LETTERS, 1998, 81 (14) :3018-3021
[7]   Finite-key analysis for practical implementations of quantum key distribution [J].
Cai, Raymond Y. Q. ;
Scarani, Valerio .
NEW JOURNAL OF PHYSICS, 2009, 11
[8]   Postselection Technique for Quantum Channels with Applications to Quantum Cryptography [J].
Christandl, Matthias ;
Koenig, Robert ;
Renner, Renato .
PHYSICAL REVIEW LETTERS, 2009, 102 (02)
[9]   QUANTUM CRYPTOGRAPHY BASED ON BELL THEOREM [J].
EKERT, AK .
PHYSICAL REVIEW LETTERS, 1991, 67 (06) :661-663
[10]   Quantum cryptography [J].
Gisin, N ;
Ribordy, GG ;
Tittel, W ;
Zbinden, H .
REVIEWS OF MODERN PHYSICS, 2002, 74 (01) :145-195