scholarly journals Security and communication distance improvement in decoy states based quantum key distribution using pseudo-random bases choice for photon polarization measurement

2021 ◽  
Vol 53 (8) ◽  
Author(s):  
Martin Tchoffo ◽  
Alain Giresse Tene
2019 ◽  
Vol 34 (04) ◽  
pp. 2050063
Author(s):  
Yefeng He ◽  
Wenping Ma

With heralded pair coherent states (HPCS), orbital angular momentum (OAM) states and pulse position modulation (PPM) technology, a decoy-state measurement-device-independent quantum key distribution (MDI-QKD) protocol is proposed. OAM states and PPM technology are used to realize the coding of the signal states in the HPCS light source. The use of HPCS light source, OAM coding and PPM coding cannot only reduce the error rate but also improve the key generation rate and communication distance. The new MDI-QKD protocol also employs three-intensity decoy states to avoid the attacks against the light source. By calculating the error rate and key generation rate, the performance of the MDI-QKD protocol is analyzed. Numerical simulation shows that the protocol has very low error rate and very high key generation rate. Moreover, the maximum communication distance can reach 455 km.


2006 ◽  
Vol 359 (2) ◽  
pp. 126-128 ◽  
Author(s):  
Ming Gao ◽  
Lin-Mei Liang ◽  
Cheng-Zu Li ◽  
Chen-Lin Tian

2007 ◽  
Vol 32 (6) ◽  
pp. 698 ◽  
Author(s):  
Hai-Qiang Ma ◽  
Jian-Ling Zhao ◽  
Ling-An Wu

Entropy ◽  
2021 ◽  
Vol 23 (12) ◽  
pp. 1691
Author(s):  
Fan Jing ◽  
Weiqi Liu ◽  
Lingzhi Kong ◽  
Chen He

In the continuous variable measurement-device-independent quantum key distribution (CV-MDI-QKD) protocol, both Alice and Bob send quantum states to an untrusted third party, Charlie, for detection through the quantum channel. In this paper, we mainly study the performance of the CV-MDI-QKD system using the noiseless linear amplifier (NLA). The NLA is added to the output of the detector at Charlie’s side. The research results show that NLA can increase the communication distance and secret key rate of the CV-MDI-QKD protocol. Moreover, we find that the more powerful the improvement of the performance with the longer gain of NLA and the optimum gain is given under different conditions.


2009 ◽  
Vol 07 (02) ◽  
pp. 529-537 ◽  
Author(s):  
WAN-YING WANG ◽  
CHUAN WANG ◽  
GUI-LU LONG

Using differential phase shift and photon polarization, we propose two quantum key distribution schemes, i.e. a double-coding BB84 protocol and a double-coding BBM92 protocol. The information capacity of these protocols is twice of the original protocols and their security is ensured by the use of detection time slots, random choice of bases and quantum entanglement. These double-coding protocols are feasible with present technology.


2007 ◽  
Vol 7 (5&6) ◽  
pp. 431-458
Author(s):  
H.-K. Lo ◽  
J. Preskill

We prove the security of the Bennett-Brassard (BB84) quantum key distribution protocol in the case where the key information is encoded in the relative phase of a coherent-state reference pulse and a weak coherent-state signal pulse, as in some practical implementations of the protocol. In contrast to previous work, our proof applies even if the eavesdropper knows the phase of the reference pulse, provided that this phase is not modulated by the source, and even if the reference pulse is bright. The proof also applies to the case where the key is encoded in the photon polarization of a weak coherent-state pulse with a known phase, but only if the phases of the four BB84 signal states are judiciously chosen. The achievable key generation rate scales quadratically with the transmission in the channel, just as for BB84 with phase-randomized weak coherent-state signals (when decoy states are not used). For the case where the phase of the reference pulse is strongly modulated by the source, we exhibit an explicit attack that allows the eavesdropper to learn every key bit in a parameter regime where a protocol using phase-randomized signals is provably secure.


2006 ◽  
Vol 20 (11n13) ◽  
pp. 1297-1303
Author(s):  
HOWARD E. BRANDT

The quantum circuit and design are given for an optimized entangling probe attacking the BB84 protocol of quantum key distribution and yielding maximum information to the probe. Probe photon polarization states become entangled with the signal states on their way between the legitimate transmitter and receiver.


2021 ◽  
Author(s):  
Martin TCHOFFO ◽  
Alain Giresse TENE

Abstract This paper proposes a new quantum key distribution(QKD) protocol, namely the pseudo-random bases entangled photon based QKD (PRB-EPQKD) protocol. The latest mainly focuses on three properties, including the security of the protocol, the secure key size and the maximum communication distance between legitimate communication users (Alice and Bob). To achieve this, we first consider a spontaneous-parametric-down (SPDC) photon source located in a low-earth-orbit (LEO) type satellite capable of producing and distributing entangled photons pairs to Alice and Bob. Secondly, we assume that Alice's and Bob's photons state measurement bases are identically generated via a pseudo-random number generator (PRNG), namely the quantum logistic map (QLM). Finally, we also assume that in addition to their photons states, Alice and Bob intentionally share a set of decoy states at each pulse with randomly selected intensity, and with the goal to detect the presence of the eavesdropper (Eve). Under these considerations, the secure key rate upper bound is evaluated applying the Gottesman-Lo-Lutkenhaus-Preskill's (GLLP) formula, for two different implementations, namely the non-decoy states and the infinite active decoy states based QKD. It is observed a significant improvement in the secure key size and the communication distance as well, compared to existing protocols, since we realize that under daylight, downlinks satellite conditions, a kindly selected light source, and good crystal's properties, the maximum communication distance can reach up to 70000 km. In addition, using the combined type-I and type-II SPDC photons source as our entangled photons pairs generator, significantly improved the photon mean number and render our protocol more robust against photon number division attack and against attenuation-induced atmospheric propagation. Furthermore, the protocol is more secure as compared to existing ones, given that any eavesdropper must crack simultaneously the chaotic system used as PRNG and the QKD system, before getting any useful information as regards to the measurement bases used by Alice and Bob, and thus the secure key.


Sign in / Sign up

Export Citation Format

Share Document