EFFICIENT QUANTUM KEY DISTRIBUTION SCHEME USING THE BELL STATE MEASUREMENT

2003 ◽  
Vol 14 (06) ◽  
pp. 757-763 ◽  
Author(s):  
XIAOYU LI

In this paper we provide a quantum key distribution (QKD) scheme based on the correlations of Einstein–Podolsky–Rosen (EPR) pairs. The scheme uses an auxiliary qubit to interact with the EPR pair and does the Bell state measurement to get the key. It is proved to be secure. All EPR pairs are used in distributing the key except some error-checking bits. So it is efficient. On the other hand there are less classical communications needed in the scheme.

2004 ◽  
Vol 15 (04) ◽  
pp. 609-617 ◽  
Author(s):  
XIAOYU LI ◽  
HOWARD BARNUM

A quantum authentication scheme is presented in this paper. Two parties share Einstein-Podolsky-Rosen(EPR) pairs previously as the identification token. They create auxiliary EPR pairs to interact with the identification token. Then the authentication is accomplished by a complete Bell state measurement. This scheme is proved to be secure. If no errors and eavesdroppers exist in the transmission, the identification token is unchanged after the authentication. So it can be reused.


2011 ◽  
Vol 11 (7&8) ◽  
pp. 615-637
Author(s):  
Tzonelih Hwang ◽  
Chia-Wei Tsai ◽  
Song-Kong Chong

This work presents a new concept in quantum key distribution called the probabilistic quantum key distribution (PQKD) protocol, which is based on the measurement uncertainty in quantum phenomena. It allows two mutually untrusted communicants to negotiate an unpredictable key that has a randomness guaranteed by the laws of quantum mechanics. In contrast to conventional QKD (e.g., BB84) in which one communicant has to trust the other for key distribution or quantum key agreement (QKA) in which the communicants have to artificially contribute subkeys to a negotiating key, PQKD is a natural and simple method for distributing a secure random key. The communicants in the illustrated PQKD take Einstein-Podolsky-Rosen (EPR) pairs as quantum resources and then use entanglement swapping and Bell-measurements to negotiate an unpredictable key.


2006 ◽  
Vol 04 (05) ◽  
pp. 769-779 ◽  
Author(s):  
FENZHUO GUO ◽  
TAILIN LIU ◽  
QIAOYAN WEN ◽  
FUCHEN ZHU

Based on entanglement swapping between two Bell states, two novel quantum key distribution protocols are proposed. One is for two-level systems, where there is no need for classical communication before each entanglement swapping. This feature is essential to its practical realization. Furthermore, to establish an arbitrarily long key, the protocol needs only two Bell states. The other is for d-level (d > 2) systems, in which higher security and higher source capacity are achieved. Using the theory of quadratic residue, we prove that in the two-qudit systems, each Bell state is a uniform superposition of all basis states in the dual basis, which is different to the situation in two-qubit systems. This difference means our two-level protocol cannot be generalized to the d-level situation directly. On the other hand, it results in higher security of our d-level protocol and is instructive to design quantum cryptography protocols.


2002 ◽  
Vol 13 (10) ◽  
pp. 1387-1392 ◽  
Author(s):  
XIAOYU LI

We provide an asymmetrical quantum key distribution protocol based on the correlations of EPR pairs. It is a variant of the modified Lo–Chau protocol where the EPR pair is not in the state Φ+ but is in one of the four states {Φ±, Ψ±}. The two sides communicating with each other are not equal in the process of establishing the key. A public key system can be built on the protocol. It differs from classical public key system in that there are three keys: the public key, the secret key and the real key.


Sign in / Sign up

Export Citation Format

Share Document