A polarization quantum key distribution scheme based on phase matching
- URL: http://arxiv.org/abs/2003.00750v2
- Date: Mon, 9 Mar 2020 14:12:37 GMT
- Title: A polarization quantum key distribution scheme based on phase matching
- Authors: Gao Feifei, Li Zhihui, Liu Chengji, Han Duo
- Abstract summary: The Quantum Key Distribution protocol can encode a single quantum state and implements an information-theoretically secure key distribution protocol in communication.
This paper successfully gives the polarization scheme of this PM-QKD protocol, the bases in the polarization scheme are arbitrary, and eliminates detector side channel attacks.
The simulation results show that our protocol is superior to the BB84 protocol in terms of transmission distance under the fixed key rate.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: The Quantum Key Distribution protocol can encode a single quantum state and
implements an information-theoretically secure key distribution protocol in
communication. In the actual QKD experimental system, there are usually two
encoding methods which are phase encoding and polarization encoding. Ma et
al.[Phase-Matching Quantum Key Distribution, Phys. Rev. X., 2018, 8(3)]
proposed the phase-matching QKD protocol, which has high transmission and it is
an extension of the measurement device independent QKD. This paper successfully
gives the polarization scheme of this PM-QKD protocol, the bases in the
polarization scheme are arbitrary, and eliminates detector side channel
attacks. Furthermore, we give the security analysis and simulation results of
the polarization scheme, and compare it with the BB84 protocol. The simulation
results show that our protocol is superior to the BB84 protocol in terms of
transmission distance under the fixed key rate.
Related papers
- Practical hybrid PQC-QKD protocols with enhanced security and performance [44.8840598334124]
We develop hybrid protocols by which QKD and PQC inter-operate within a joint quantum-classical network.
In particular, we consider different hybrid designs that may offer enhanced speed and/or security over the individual performance of either approach.
arXiv Detail & Related papers (2024-11-02T00:02:01Z) - Twin-field-based multi-party quantum key agreement [0.0]
We study a method to extend the twin-field key distribution protocol to a scheme for multi-party quantum key agreement.
We derive the key rate based on the entanglement-based source-replacement scheme.
arXiv Detail & Related papers (2024-09-06T11:51:10Z) - Decoherence-assisted quantum key distribution [37.69303106863453]
We show that our method reduces the amount of information that an eavesdropper can obtain in the BB84 protocol under the entangling probe attack.
We demonstrate experimentally that Alice and Bob can agree on a scheme to that gives low values of the quantum bit error rate.
arXiv Detail & Related papers (2024-05-30T15:28:07Z) - Experimental implementation of distributed phase reference quantum key
distribution protocols [1.4513830934124623]
We have experimentally realized optical fiber based coherent one way and differential phase shift QKD protocols at telecom wavelength.
Both protocols belong to a class of protocols named as distributed phase reference protocol in which weak coherent pulses are used to encode the information.
arXiv Detail & Related papers (2023-12-30T05:29:26Z) - Efficient Device-Independent Quantum Key Distribution [4.817429789586127]
Device-independent quantum key distribution (DIQKD) is a key distribution scheme whose security is based on the laws of quantum physics.
We propose an efficient device-independent quantum key distribution protocol in which one participant prepares states and transmits them to another participant.
arXiv Detail & Related papers (2023-11-16T13:01:34Z) - Practical quantum secure direct communication with squeezed states [55.41644538483948]
We report the first table-top experimental demonstration of a CV-QSDC system and assess its security.
This realization paves the way into future threat-less quantum metropolitan networks, compatible with coexisting advanced wavelength division multiplexing (WDM) systems.
arXiv Detail & Related papers (2023-06-25T19:23:42Z) - Data post-processing for the one-way heterodyne protocol under
composable finite-size security [62.997667081978825]
We study the performance of a practical continuous-variable (CV) quantum key distribution protocol.
We focus on the Gaussian-modulated coherent-state protocol with heterodyne detection in a high signal-to-noise ratio regime.
This allows us to study the performance for practical implementations of the protocol and optimize the parameters connected to the steps above.
arXiv Detail & Related papers (2022-05-20T12:37:09Z) - Discrete-variable quantum key distribution with homodyne detection [14.121646217925441]
We propose a protocol that combines the simplicity of quantum state preparation in DV-QKD together with the cost-effective and high-bandwidth of homodyne detectors used in CV-QKD.
Our simulation suggests that the protocol is suitable for secure and high-speed practical key distribution over distances.
arXiv Detail & Related papers (2021-09-01T17:12:28Z) - Composably secure data processing for Gaussian-modulated continuous
variable quantum key distribution [58.720142291102135]
Continuous-variable quantum key distribution (QKD) employs the quadratures of a bosonic mode to establish a secret key between two remote parties.
We consider a protocol with homodyne detection in the general setting of composable finite-size security.
In particular, we analyze the high signal-to-noise regime which requires the use of high-rate (non-binary) low-density parity check codes.
arXiv Detail & Related papers (2021-03-30T18:02:55Z) - Round-robin differential phase-time-shifting protocol for quantum key
distribution: theory and experiment [58.03659958248968]
Quantum key distribution (QKD) allows the establishment of common cryptographic keys among distant parties.
Recently, a QKD protocol that circumvents the need for monitoring signal disturbance, has been proposed and demonstrated in initial experiments.
We derive the security proofs of the round-robin differential phase-time-shifting protocol in the collective attack scenario.
Our results show that the RRDPTS protocol can achieve higher secret key rate in comparison with the RRDPS, in the condition of high quantum bit error rate.
arXiv Detail & Related papers (2021-03-15T15:20:09Z) - Afterpulsing Effect on the Baseline System Error Rate and on the
Decoy-State Quantum Key Distribution Protocols [0.0]
We develop a theoretical analysis of afterpulsing effect on the decoy-state QKD protocols for multiple detectors.
Results can be used as a guide for every practical decoy-state QKD protocol implementation in real-world deployments.
arXiv Detail & Related papers (2020-10-07T12:06:23Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.