Dual-velocity protocol of hybrid QKD system and its security analysis

被引:19
作者
Yang, L [1 ]
Wu, LA
Liu, SH
机构
[1] Chinese Acad Sci, Grad Sch, State Key Lab Informat Secur, Beijing 100039, Peoples R China
[2] Chinese Acad Sci, Inst Phys, Beijing 100080, Peoples R China
[3] S China Normal Univ, Inst Quantum Elect, Guangzhou 510631, Peoples R China
关键词
quantum cryptography; fiber-optic quantum key distribution; dual-velocity protocol;
D O I
10.7498/aps.51.2446
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Based on the hypothesis that the velocity of light in vacuum is the maximum velocity possible for any signal, we present a dual-velocity protocol for a hybrid quantum key distribution (QKD) system, and prove that its security is the same as that for the BB84 protocol. We show that this protocol can improve the efficiency of quantum key generation from 50% to 100%, and, at the same time, reduce Eve's information. Because it breaks the symmetry between Bob and Eve before open discussion, the dual-velocity protocol extends the concept of QKD and increases our choice of protocol bases. We present three application examples and analyze in detail their security under intercept/resend attacks.
引用
收藏
页码:2446 / 2451
页数:6
相关论文
共 12 条
[1]   Incoherent and coherent eavesdropping in the six-state protocol of quantum cryptography [J].
Bechmann-Pasquinucci, H ;
Gisin, N .
PHYSICAL REVIEW A, 1999, 59 (06) :4238-4248
[2]  
Bennett C. H., 1992, Journal of Cryptology, V5, P3, DOI 10.1007/BF00191318
[3]  
Bennett C. H., 1984, PROC IEEE INT C COMP, P175, DOI [DOI 10.1016/J.TCS.2014.05.025, 10.1016/j.tcs.2014.05.025]
[4]  
BORN M, 1999, Principles of Optics
[5]   Optimal eavesdropping in quantum cryptography with six states [J].
Bruss, D .
PHYSICAL REVIEW LETTERS, 1998, 81 (14) :3018-3021
[6]  
HWANG WY, 2000, QUANTPH0009006
[7]   Unconditional security of quantum key distribution over arbitrarily long distances [J].
Lo, HK ;
Chau, HF .
SCIENCE, 1999, 283 (5410) :2050-2056
[8]   IS A PHOTON AMPLIFIER ALWAYS POLARIZATION DEPENDENT [J].
MANDEL, L .
NATURE, 1983, 304 (5922) :188-188
[9]   Simple proof of security of the BB84 quantum key distribution protocol [J].
Shor, PW ;
Preskill, J .
PHYSICAL REVIEW LETTERS, 2000, 85 (02) :441-444
[10]   A SINGLE QUANTUM CANNOT BE CLONED [J].
WOOTTERS, WK ;
ZUREK, WH .
NATURE, 1982, 299 (5886) :802-803