Security of the decoy state method for quantum key distribution

被引:15
|
作者
Trushechkin, A. S. [1 ,2 ]
Kiktenko, E. O. [1 ,2 ,3 ,4 ]
Kronberg, D. A. [1 ,3 ,4 ]
Fedorov, A. K. [3 ,4 ]
机构
[1] Russian Acad Sci, Steklov Math Inst, Ul Gubkina 8, Moscow 119991, Russia
[2] Natl Univ Sci & Technol MISIS, Competence Ctr Quantum Commun, Natl Technol Initiat, Leninskii Prosp 4, Moscow 119049, Russia
[3] Int Ctr Quantum Opt & Quantum Technol, Russian Quantum Ctr, Ul Novaya 100, Skolkovo 143025, Moscow Region, Russia
[4] Natl Res Univ, Moscow Inst Phys & Technol, Inst Skii Per 9, Dolgoprudnyi 141701, Moscow Region, Russia
基金
俄罗斯科学基金会;
关键词
quantum cryptography; quantum key distribution; BB84; decoy states; CRYPTOGRAPHY; AUTHENTICATION; INFORMATION; COMPUTERS; PROOF;
D O I
10.3367/UFNe.2020.11.038882
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Quantum cryptography or, more precisely, quantum key distribution (QKD), is one of the advanced areas in the field of quantum technologies. The confidentiality of keys distributed with the use of QKD protocols is guaranteed by the fundamental laws of quantum mechanics. This paper is devoted to the decoy state method, a countermeasure against vulnerabilities caused by the use of coherent states of light for QKD protocols whose security is proved under the assumption of single-photon states. We give a formal security proof of the decoy state method against all possible attacks. We compare two widely known attacks on multiphoton pulses: photon-number splitting and beam splitting. Finally, we discuss the equivalence of polarization and phase coding.
引用
收藏
页码:88 / 102
页数:15
相关论文
共 50 条
  • [41] Analysis of decoy state quantum-key-distribution system
    Jiao Rong-Zhen
    Zhang Wen-Han
    [J]. ACTA PHYSICA SINICA, 2009, 58 (04) : 2189 - 2192
  • [42] Experimental passive decoy-state quantum key distribution
    Sun, Qi-Chao
    Wang, Wei-Long
    Liu, Yang
    Zhou, Fei
    Pelc, Jason S.
    Fejer, M. M.
    Peng, Cheng-Zhi
    Chen, Xianfeng
    Ma, Xiongfeng
    Zhang, Qiang
    Pan, Jian-Wei
    [J]. LASER PHYSICS LETTERS, 2014, 11 (08)
  • [43] Passive decoy state phase matching quantum key distribution
    Zhou, Jiang-Ping
    Zhou, Yuan-Yuan
    Gu, Rui-Wen
    Zhou, Xue-Jun
    [J]. INTERNATIONAL JOURNAL OF QUANTUM INFORMATION, 2022, 20 (04)
  • [44] Experimental Passive Decoy-state Quantum Key Distribution
    Sun, Qi-Chao
    Wang, Wei-Long
    Liu, Yang
    Zhou, Fei
    Pelc, Jason S.
    Fejer, M. M.
    Peng, Cheng-Zhi
    Chen, Xian-Feng
    Ma, Xiong-Feng
    Zhang, Qiang
    Pan, Jian-Wei
    [J]. 2014 CONFERENCE ON LASERS AND ELECTRO-OPTICS (CLEO), 2014,
  • [45] Decoy state quantum key distribution in telecom dark fiber
    Chen, Wei
    Han, Zheng-fu
    Yin, Zhen-qiang
    Wu, Qing-lin
    Wei, Guo
    Guo, Guang-can
    [J]. QUANTUM OPTICS, OPTICAL DATA STORAGE, AND ADVANCED MICROLITHOGRAPHY, 2008, 6827
  • [46] Experimental demonstration of passive decoy state quantum key distribution
    张阳
    王双
    银振强
    陈巍
    梁文烨
    李宏伟
    郭光灿
    韩正甫
    [J]. Chinese Physics B, 2012, 21 (10) : 101 - 104
  • [47] Security bounds for decoy-state quantum key distribution with arbitrary photon-number statistics
    Foletto, Giulio
    Picciariello, Francesco
    Agnesi, Costantino
    Villoresi, Paolo
    Vallone, Giuseppe
    [J]. PHYSICAL REVIEW A, 2022, 105 (01)
  • [49] Decoy-state method of quantum key distribution with both source errors and statistics fluctuations
    Chi, Huan-Hang
    Yu, Zong-Wen
    Wang, Xiang-Bin
    [J]. PHYSICAL REVIEW A, 2012, 86 (04)
  • [50] New method of decoy state quantum key distribution with a heralded single-photon source
    Quan, Dong-Xiao
    Pei, Chang-Xing
    Zhu, Chang-Hua
    Liu, Dan
    [J]. Wuli Xuebao/Acta Physica Sinica, 2008, 57 (09): : 5600 - 5604