Using Cascade in quantum key distribution

被引:3
|
作者
Tupkary, Devashish [1 ,2 ]
Lutkenhaus, Norbert [1 ,2 ]
机构
[1] Univ Waterloo, Inst Quantum Comp, Waterloo, ON N2L 3G1, Canada
[2] Univ Waterloo, Dept Phys & Astron, Waterloo, ON N2L 3G1, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
INFORMATION RECONCILIATION PROTOCOL; SECRET-KEY; CRYPTOGRAPHY; SECURITY;
D O I
10.1103/PhysRevApplied.20.064040
中图分类号
O59 [应用物理学];
学科分类号
摘要
We point out a critical flaw in the analysis of quantum key distribution protocols that employ the twoall two-way communication that occurs during the Cascade protocol. We present a straightforward and elegant alternative approach that addresses this flaw and produces valid key rates. We exemplify our new approach by comparing its key rates with those generated using older, incorrect approaches, for qubit BB84 and decoy-state BB84 protocols. We show that, in many practically relevant situations, our rectified approach produces the same key rate as older, incorrect approaches. However, in other scenarios, our approach produces valid key rates that are lower, highlighting the importance of properly accounting for all two-way communication during Cascade.
引用
收藏
页数:13
相关论文
共 50 条
  • [31] Quantum Key Distribution
    Seshu, Ch.
    GLOBAL E-SECURITY, PROCEEDINGS, 2008, 12 : 200 - 209
  • [32] Quantum key distribution
    Ouellette, Jennifer
    Industrial Physicist, 2004, 10 (06): : 22 - 25
  • [33] Unsymmetrical Quantum Key Distribution Using Tripartite Entanglement
    XIONG Jin~(1
    CommunicationsinTheoreticalPhysics, 2007, 47 (03) : 441 - 445
  • [34] Enhancing Grid Security using Quantum Key Distribution
    Khan, Muhammad Mubashir
    Xu, Jie
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2012, 6 (04): : 67 - 75
  • [35] Quantum key distribution protocols using entangled state
    Wang, Jian
    Zhang, Quan
    Tang, Chao-jing
    2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1355 - 1358
  • [36] Modelling and Simulation of Quantum Key Distribution using OptSim
    Grote, Olaf
    Ahrens, Andreas
    Benavente-Peces, Cesar
    2021 IEEE WORKSHOP ON MICROWAVE THEORY AND TECHNIQUES IN WIRELESS COMMUNICATIONS, MTTW'21, 2021, : 160 - 164
  • [37] Unsymmetrical quantum key distribution using tripartite entanglement
    Xiong Jin
    Zhang Zhe-Shen
    Zhou Nan-Run
    Peng Jin-Ye
    Zeng Gui-Hua
    COMMUNICATIONS IN THEORETICAL PHYSICS, 2007, 47 (03) : 441 - 445
  • [38] Quantum key distribution using sequential weak values
    Troupe J.E.
    Quantum Studies: Mathematics and Foundations, 2014, 1 (1-2) : 79 - 96
  • [39] Quantum key distribution protocol using random bases
    Meslouhi, A.
    Amellal, H.
    Hassouni, Y.
    El Baz, M.
    El Allati, A.
    INTERNATIONAL JOURNAL OF MODERN PHYSICS B, 2016, 30 (10):
  • [40] Quantum key distribution using three basis states
    Subhash Kak
    Pramana, 2000, 54 : 709 - 713