Security of six-state quantum key distribution protocol with threshold detectors

被引:3
|
作者
Kato, Go [1 ]
Tamaki, Kiyoshi [2 ]
机构
[1] NTT Corp, NTT Commun Sci Labs, 3-1 Morinosato Wakamiya, Atsugi, Kanagawa 2430198, Japan
[2] NTT Corp, NTT Basic Res Labs, 3-1 Morinosato Wakamiya, Atsugi, Kanagawa 2430198, Japan
来源
SCIENTIFIC REPORTS | 2016年 / 6卷
关键词
CRYPTOGRAPHY; SYSTEMS;
D O I
10.1038/srep30044
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
The security of quantum key distribution (QKD) is established by a security proof, and the security proof puts some assumptions on the devices consisting of a QKD system. Among such assumptions, security proofs of the six-state protocol assume the use of photon number resolving (PNR) detector, and as a result the bit error rate threshold for secure key generation for the six-state protocol is higher than that for the BB84 protocol. Unfortunately, however, this type of detector is demanding in terms of technological level compared to the standard threshold detector, and removing the necessity of such a detector enhances the feasibility of the implementation of the six-state protocol. Here, we develop the security proof for the six-state protocol and show that we can use the threshold detector for the six-state protocol. Importantly, the bit error rate threshold for the key generation for the six-state protocol (12.611%) remains almost the same as the one (12.619%) that is derived from the existing security proofs assuming the use of PNR detectors. This clearly demonstrates feasibility of the six-state protocol with practical devices.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] Security of six-state quantum key distribution protocol with threshold detectors
    Go Kato
    Kiyoshi Tamaki
    [J]. Scientific Reports, 6
  • [2] Improved two-way six-state protocol for quantum key distribution
    Shaari, J. S.
    Bahari, Asma' Ahmad
    [J]. PHYSICS LETTERS A, 2012, 376 (45) : 2962 - 2966
  • [3] Upper bound to accessible information for the six-state quantum key distribution protocol
    Mafu, Mhlambululi
    Petruccione, Francesco
    [J]. PROCEEDINGS OF SAIP2012: THE 57TH ANNUAL CONFERENCE OF THE SOUTH AFRICAN INSTITUTE OF PHYSICS, 2012, : 572 - 575
  • [4] Proof of unconditional security of six-state quatum key distribution scheme
    Lo, Hoi-Kwong
    [J]. Quantum Information and Computation, 2001, 1 (02): : 81 - 94
  • [5] PROOF OF UNCONDITIONAL SECURITY OF SIX-STATE QUATUM KEY DISTRIBUTION SCHEME
    Lo, Hoi-Kwong
    [J]. QUANTUM INFORMATION & COMPUTATION, 2001, 1 (02) : 81 - 94
  • [6] Entanglement based six-state quantum cryptography protocol: exact proof of security
    Kulik, S. P.
    Molotkov, S. N.
    [J]. LASER PHYSICS LETTERS, 2023, 20 (05)
  • [7] Measuring-basis-encrypted six-state quantum key distribution scheme
    Chen, P
    Deng, FG
    Wang, PX
    Long, GL
    [J]. PROGRESS IN NATURAL SCIENCE-MATERIALS INTERNATIONAL, 2006, 16 (01) : 84 - 89
  • [8] Finite-key analysis of the six-state protocol with photon-number-resolution detectors
    Abruzzo, Silvestre
    Mertz, Markus
    Kampermann, Hermann
    Bruss, Dagmar
    [J]. OPTICS AND PHOTONICS FOR COUNTERTERRORISM AND CRIME FIGHTING VII OPTICAL MATERIALS IN DEFENCE SYSTEMS TECHNOLOGY VIII AND QUANTUM-PHYSICS-BASED INFORMATION SECURITY, 2011, 8189
  • [9] Six-State Quantum Key Distribution Using Photons with Orbital Angular Momentum
    Li Jun-Lin
    Wang Chuan
    [J]. CHINESE PHYSICS LETTERS, 2010, 27 (11)
  • [10] Measuring-basis-encrypted six-state quantum key distribution scheme
    CHEN Pan1
    2. Key Laboratory for Atomic and Molecular NanoSciences
    [J]. Progress in Natural Science:Materials International, 2006, (01) : 84 - 89