Security of six-state quantum key distribution protocol with threshold detectors

被引:3
|
作者
Kato, Go [1 ]
Tamaki, Kiyoshi [2 ]
机构
[1] NTT Corp, NTT Commun Sci Labs, 3-1 Morinosato Wakamiya, Atsugi, Kanagawa 2430198, Japan
[2] NTT Corp, NTT Basic Res Labs, 3-1 Morinosato Wakamiya, Atsugi, Kanagawa 2430198, Japan
来源
SCIENTIFIC REPORTS | 2016年 / 6卷
关键词
CRYPTOGRAPHY; SYSTEMS;
D O I
10.1038/srep30044
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
The security of quantum key distribution (QKD) is established by a security proof, and the security proof puts some assumptions on the devices consisting of a QKD system. Among such assumptions, security proofs of the six-state protocol assume the use of photon number resolving (PNR) detector, and as a result the bit error rate threshold for secure key generation for the six-state protocol is higher than that for the BB84 protocol. Unfortunately, however, this type of detector is demanding in terms of technological level compared to the standard threshold detector, and removing the necessity of such a detector enhances the feasibility of the implementation of the six-state protocol. Here, we develop the security proof for the six-state protocol and show that we can use the threshold detector for the six-state protocol. Importantly, the bit error rate threshold for the key generation for the six-state protocol (12.611%) remains almost the same as the one (12.619%) that is derived from the existing security proofs assuming the use of PNR detectors. This clearly demonstrates feasibility of the six-state protocol with practical devices.
引用
收藏
页数:5
相关论文
共 50 条
  • [31] Single-state semi-quantum key distribution protocol and its security proof
    Zhang, Wei
    Qiu, Daowen
    Mateus, Paulo
    [J]. INTERNATIONAL JOURNAL OF QUANTUM INFORMATION, 2020, 18 (04)
  • [32] Numerical security analysis of the three-state quantum key distribution protocol with realistic devices
    Peng, Sirui
    Sun, Xiaoming
    Zhou, Hongyi
    [J]. JOURNAL OF THE OPTICAL SOCIETY OF AMERICA B-OPTICAL PHYSICS, 2024, 41 (01) : 258 - 269
  • [33] Security of the decoy state method for quantum key distribution
    Trushechkin, A. S.
    Kiktenko, E. O.
    Kronberg, D. A.
    Fedorov, A. K.
    [J]. PHYSICS-USPEKHI, 2021, 64 (01) : 88 - 102
  • [34] Quantum Key Distribution: Examination of the Decoy State Protocol
    Mailloux, Logan O.
    Grimaila, Michael R.
    Colombi, John M.
    Hodson, Douglas D.
    Engle, Ryan D.
    McLaughlin, Colin V.
    Baumgartner, Gerald
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2015, 53 (10) : 24 - 31
  • [35] Security proof of a three-state quantum-key-distribution protocol without rotational symmetry
    Fung, Chi-Hang Fred
    Lo, Hoi-Kwong
    [J]. PHYSICAL REVIEW A, 2006, 74 (04):
  • [36] Improved Security of SDN based on Hybrid Quantum Key Distribution Protocol
    Mahdi, Suadad S.
    Abdullah, Alharith A.
    [J]. PROCEEDING OF THE 2ND 2022 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND SOFTWARE ENGINEERING (CSASE 2022), 2022, : 36 - 40
  • [37] SECURITY OF QUANTUM KEY DISTRIBUTION WITH STATE-DEPENDENT IMPERFECTIONS
    Li, Hong-Wei
    Yin, Zhen-Qiang
    Wang, Shuang
    Bao, Wan-Su
    Guo, Guang-Can
    Han, Zheng-Fu
    [J]. QUANTUM INFORMATION & COMPUTATION, 2011, 11 (11-12) : 937 - 947
  • [38] Security of Quantum Key Distribution
    Beaudry, Normand
    Ferenczi, Agnes
    Narasimhachar, Varun
    Moroder, Tobias
    Ma, Xiongfeng
    Piani, Marco
    Luekenhaus, Norbert
    [J]. 2010 CONFERENCE ON OPTICAL FIBER COMMUNICATION OFC COLLOCATED NATIONAL FIBER OPTIC ENGINEERS CONFERENCE OFC-NFOEC, 2010,
  • [39] Security of quantum key distribution
    Renner, Renato
    [J]. INTERNATIONAL JOURNAL OF QUANTUM INFORMATION, 2008, 6 (01) : 1 - 127
  • [40] Security of Quantum Key Distribution
    Yuen, Horace P.
    [J]. IEEE ACCESS, 2016, 4 : 724 - 749