Quantum key distribution with an unknown and untrusted source

Physics – Quantum Physics

Scientific paper

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

31 pages, 6 figures, REVTeX

Scientific paper

10.1103/PhysRevA.77.052327

The security of a standard bi-directional "plug & play" quantum key distribution (QKD) system has been an open question for a long time. This is mainly because its source is equivalently controlled by an eavesdropper, which means the source is unknown and untrusted. Qualitative discussion on this subject has been made previously. In this paper, we present the first quantitative security analysis on a general class of QKD protocols whose sources are unknown and untrusted. The securities of standard BB84 protocol, weak+vacuum decoy state protocol, and one-decoy decoy state protocol, with unknown and untrusted sources are rigorously proved. We derive rigorous lower bounds to the secure key generation rates of the above three protocols. Our numerical simulation results show that QKD with an untrusted source gives a key generation rate that is close to that with a trusted source.

No associations

LandOfFree

Say what you really think

Search LandOfFree.com for scientists and scientific papers. Rate them and share your experience with other people.

Rating

Quantum key distribution with an unknown and untrusted source does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.

If you have personal experience with Quantum key distribution with an unknown and untrusted source, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Quantum key distribution with an unknown and untrusted source will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFWR-SCP-O-646865

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.