scholarly journals Key generation schemes for channel authentication in quantum key distribution protocol

2021 ◽  
Vol 2 (3) ◽  
pp. 90-97
Author(s):  
Mikhail Borodin ◽  
Andrey Zhilyaev ◽  
Alexey Urivskiy
2019 ◽  
Vol 19 (15&16) ◽  
pp. 1279-1293
Author(s):  
Radha Pyari Sandhir

A quantum key distribution protocol is proposed that is a variation of BB84 that provides raw key generation from correlations that violate a Bell-type inequality for single qubit systems and not entangled pairs. Additionally, it 1) is state-independent, 2) involves two-way classical communication, and 3) does not require basis matching between the two parties. The Brukner-Taylor-Cheung-Vedral (BTCV) time-like form of the Bell-CHSH inequality by Bruk and by Tay is employed as an eavesdropping check; sequential measurements lead to an inequality identical in form to the Bell-CHSH inequality, which relies only on the measurements performed with no regard for the qubit states. We show that this form manifests naturally from the non-commutativity of observables.


2004 ◽  
Vol 4 (5) ◽  
pp. 325-360
Author(s):  
D. Gottesman ◽  
H.-K. Lo ◽  
N. L\"utkenhaus ◽  
J. Preskill

We prove the security of the Bennett-Brassard (BB84) quantum key distribution protocol in the case where the source and detector are under the limited control of an adversary. Our proof applies when both the source and the detector have small basis-dependent flaws, as is typical in practical implementations of the protocol. We derive a general lower bound on the asymptotic key generation rate for weakly basis-dependent eavesdropping attacks, and also estimate the rate in some special cases: sources that emit weak coherent states with random phases, detectors with basis-dependent efficiency, and misaligned sources and detectors.


2014 ◽  
Vol 14 (13&14) ◽  
pp. 1081-1088
Author(s):  
Jordan S. Cotler ◽  
Peter W. Shor

We introduce a new relativistic orthogonal states quantum key distribution protocol which leverages the properties of both quantum mechanics and special relativity to securely encode multiple bits onto the spatio-temporal modes of a single photon. If the protocol is implemented using a single photon source, it can have a key generation rate faster than the repetition rate of the source, enabling faster secure communication than is possible with existing protocols. Further, we provide a proof that the protocol is secure and give a method of implementing the protocol using line-of-sight and fiber optic channels.


Laser Physics ◽  
2010 ◽  
Vol 20 (5) ◽  
pp. 1210-1214 ◽  
Author(s):  
F. A. A. El-Orany ◽  
M. R. B. Wahiddin ◽  
M. -A. Mat-Nor ◽  
N. Jamil ◽  
I. Bahari

2005 ◽  
Vol 13 (23) ◽  
pp. 9415 ◽  
Author(s):  
Yun-kun Jiang ◽  
Xiang-Bin Wang ◽  
Bao-Sen Shi ◽  
Akihisa Tomita

2021 ◽  
Vol 11 (1) ◽  
Author(s):  
Chia-Wei Tsai ◽  
Chun-Wei Yang

AbstractThe mediated semi-quantum key distribution (MSQKD) protocol is an important research issue that lets two classical participants share secret keys securely between each other with the help of a third party (TP). However, in the existing MSQKD protocols, there are two improvable issues, namely (1) the classical participants must be equipped with expensive detectors to avoid Trojan horse attacks and (2) the trustworthiness level of TP must be honest. To the best of our knowledge, none of the existing MSQKD protocols can resolve both these issues. Therefore, this study takes Bell states as the quantum resource to propose a MSQKD protocol, in which the classical participants do not need a Trojan horse detector and the TP is dishonest. Furthermore, the proposed protocol is shown to be secure against well-known attacks and the classical participants only need two quantum capabilities. Therefore, in comparison to the existing MSQKD protocols, the proposed protocol is better practical.


Sign in / Sign up

Export Citation Format

Share Document