High-Rate, High-Dimensional Quantum Key Distribution Systems

Author(s):  
Nurul T. Islam
2019 ◽  
Vol 4 (3) ◽  
pp. 035008 ◽  
Author(s):  
Nurul T Islam ◽  
Charles Ci Wen Lim ◽  
Clinton Cahall ◽  
Bing Qi ◽  
Jungsang Kim ◽  
...  

2019 ◽  
Vol 19 (11&12) ◽  
pp. 913-934
Author(s):  
Daan Leermakers ◽  
Boris Skoric

Quantum Key Recycling aims to re-use the keys employed in quantum encryption and quantum authentication schemes. QKR protocols can achieve better round complexity than Quantum Key Distribution. We consider a QKR protocol that works with qubits, as opposed to high-dimensional qudits. A security proof was given by Fehr and Salvail in the case where there is practically no noise. A high-rate scheme for the noisy case was proposed by \v{S}kori\'{c} and de Vries, based on eight-state encoding. However, a security proof was not given. In this paper we introduce a protocol modification and provide a security proof. The modified protocol has high rate not only for 8-state encoding, but also 6-state and BB84 encoding. Our proof is based on a bound on the trace distance between the real quantum state of the system and a state in which the keys are completely secure. It turns out that the rate is higher than suggested by previous results. Asymptotically the rate equals the rate of Quantum Key Distribution with one-way postprocessing.


Cryptography ◽  
2017 ◽  
Vol 1 (3) ◽  
pp. 18 ◽  
Author(s):  
Anton Pljonkin ◽  
Konstantin Rumyantsev ◽  
Pradeep Singh

2016 ◽  
Vol 24 (19) ◽  
pp. 22159 ◽  
Author(s):  
Haize Bao ◽  
Wansu Bao ◽  
Yang Wang ◽  
Ruike Chen ◽  
Chun Zhou ◽  
...  

2014 ◽  
pp. 811-840
Author(s):  
K. E. Rumyantsev ◽  
D. M. Golubchikov

This chapter is an analysis of commercial quantum key distribution systems. Upon analysis, the generalized structure of QKDS with phase coding of a photon state is presented. The structure includes modules that immediately participate in the task of distribution and processing of quantum states. Phases of key sequence productions are studied. Expressions that allow the estimation of physical characteristics of optoelectronic components, as well as information processing algorithms impact to rate of key sequence production, are formed. Information security infrastructure can be utilized, for instance, to formulate requirements to maximize tolerable error level in quantum channel with a given rate of key sequence production.


Sign in / Sign up

Export Citation Format

Share Document