Entanglement recycled quantum key distribution scheme without sifting
over arbitrary long distance
- URL: http://arxiv.org/abs/2107.01960v1
- Date: Mon, 5 Jul 2021 11:57:59 GMT
- Title: Entanglement recycled quantum key distribution scheme without sifting
over arbitrary long distance
- Authors: Hao Shu
- Abstract summary: Quantum key distribution (QKD) is an important area in quantum information theory.
In this paper, we give a QKD scheme which can recycle entangled states and need not to run sifting procedures.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Quantum key distribution(QKD) is an important area in quantum information
theory. Nowadays, there are many protocols such as BB84 protocol, Lo-Chau's
protocol and GR10 protocol. They usually require legitimated parties have the
ability to create particles, using a sifting procedures (BB84, GR10), or must
destroy entangled states (Lo-Chau). In this paper, we give a QKD scheme which
can recycle entangled states and need not to run sifting procedures. The
protocol use teleportation and mutual unbiased bases of qudits. Moreover, The
scheme can be modified to add a third party who assumes all the states creating
procedures and so the communicated parties need not to create states. This is
in fact an entanglement distribution protocol. Also, the protocol can be
modified for distributing key over arbitrary long distance. We compare our
protocol with the previous protocols and discuss the security of it by
corresponding to BB84 protocol.
Related papers
- Decoherence-assisted quantum key distribution [37.69303106863453]
We show that our method reduces the amount of information that an eavesdropper can obtain in the BB84 protocol under the entangling probe attack.
We demonstrate experimentally that Alice and Bob can agree on a scheme to that gives low values of the quantum bit error rate.
arXiv Detail & Related papers (2024-05-30T15:28:07Z) - A Secure Quantum Key Distribution Protocol Using Two-Particle Transmission [0.0]
Unextendible Product Bases (UPBs) hold promise in quantum cryptography due to their inherent indistinguishability.
This work introduces a protocol utilizing UPBs to establish quantum keys between distant parties.
arXiv Detail & Related papers (2024-03-20T14:33:17Z) - Transversal Injection: Using the Surface Code to Prepare Non-Pauli Eigenstates [37.94431794242543]
Quantum Error Correction (QEC) allows us to use systems with a large number of physical qubits and a favourable logical error rate.
Transversal Injection is a new method of preparing logical non-Pauliigen estates that can be used as resource states for quantum computation.
arXiv Detail & Related papers (2023-12-27T03:32:03Z) - Practical Phase-Coding Side-Channel-Secure Quantum Key Distribution [8.464021993320305]
A new QKD protocol called phasecoding side-channel-secure channels (PC-SCS) protocol is proposed.
A finite-key security analysis against coherent attack of the new protocol is given.
A practical transmission distance of 300 km can be realized by the PC-SCS protocol.
arXiv Detail & Related papers (2023-05-23T09:34:47Z) - Boosted quantum and semi-quantum communication protocols [0.0]
We show that it is possible to reduce the number of such runs by a suitable design of the key generation rule.
We illustrate this advantage by proposing quantum and semi-quantum key distribution protocols.
arXiv Detail & Related papers (2023-03-24T12:33:22Z) - Data post-processing for the one-way heterodyne protocol under
composable finite-size security [62.997667081978825]
We study the performance of a practical continuous-variable (CV) quantum key distribution protocol.
We focus on the Gaussian-modulated coherent-state protocol with heterodyne detection in a high signal-to-noise ratio regime.
This allows us to study the performance for practical implementations of the protocol and optimize the parameters connected to the steps above.
arXiv Detail & Related papers (2022-05-20T12:37:09Z) - Quantum cryptography with classical communication: parallel remote state
preparation for copy-protection, verification, and more [125.99533416395765]
Many cryptographic primitives are two-party protocols, where one party, Bob, has full quantum computational capabilities, and the other party, Alice, is only required to send random BB84 states to Bob.
We show how such protocols can generically be converted to ones where Alice is fully classical, assuming that Bob cannot efficiently solve the LWE problem.
This means that all communication between (classical) Alice and (quantum) Bob is classical, yet they can still make use of cryptographic primitives that would be impossible if both parties were classical.
arXiv Detail & Related papers (2022-01-31T18:56:31Z) - Quantum key distribution based on orthogonal state encoding [0.0]
Two quantum key distribution protocols are presented.
One does not need to employ order-rearrangement techniques while the other needs to.
We modify the protocols for implementing in noisy channels by applying the testing state method.
arXiv Detail & Related papers (2021-07-05T12:14:05Z) - Round-robin differential phase-time-shifting protocol for quantum key
distribution: theory and experiment [58.03659958248968]
Quantum key distribution (QKD) allows the establishment of common cryptographic keys among distant parties.
Recently, a QKD protocol that circumvents the need for monitoring signal disturbance, has been proposed and demonstrated in initial experiments.
We derive the security proofs of the round-robin differential phase-time-shifting protocol in the collective attack scenario.
Our results show that the RRDPTS protocol can achieve higher secret key rate in comparison with the RRDPS, in the condition of high quantum bit error rate.
arXiv Detail & Related papers (2021-03-15T15:20:09Z) - Entanglement purification by counting and locating errors with
entangling measurements [62.997667081978825]
We consider entanglement purification protocols for multiple copies of qubit states.
We use high-dimensional auxiliary entangled systems to learn about number and positions of errors in the noisy ensemble.
arXiv Detail & Related papers (2020-11-13T19:02:33Z) - A polarization quantum key distribution scheme based on phase matching [0.0]
The Quantum Key Distribution protocol can encode a single quantum state and implements an information-theoretically secure key distribution protocol in communication.
This paper successfully gives the polarization scheme of this PM-QKD protocol, the bases in the polarization scheme are arbitrary, and eliminates detector side channel attacks.
The simulation results show that our protocol is superior to the BB84 protocol in terms of transmission distance under the fixed key rate.
arXiv Detail & Related papers (2020-03-02T10:33:18Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.