The security of SARG04 protocol in plug and play QKD system with an untrusted source

作者: Bingjie Xu , Xiang Peng , Hong Guo , None

DOI: 10.26421/QIC12.7-8-8

关键词: Computer networkQuantum key distributionTheoretical computer scienceSARG04Quantum cryptographyProcess (computing)Noise (signal processing)Plug and playComputer scienceProtocol (object-oriented programming)Statistical parameter

摘要: The SARG04 protocol is one of the most frequently used in commercial plug-and-play quantum key distribution (QKD) system, where an eavesdropper can completely control or change photon number statistics QKD source. To ensure security system with unknown and untrusted source, bounds a few statistical parameters source need to be monitored. An active passive monitor schemes are proposed verify these parameters. Furthermore, practical issues due fluctuation detection noise monitoring process quantitatively analyzed. Our simulation results show that scheme efficiently applied protocol.

参考文章(47)
Chi-Hang Fred Fung, Kiyoshi Tamaki, Hoi-Kwong Lo, Performance of two quantum-key-distribution protocols Physical Review A. ,vol. 73, pp. 012337- ,(2006) , 10.1103/PHYSREVA.73.012337
Xiang-Bin Wang, Cheng-Zhi Peng, Jun Zhang, Lin Yang, Jian-Wei Pan, General theory of decoy-state quantum cryptography with source errors Physical Review A. ,vol. 77, pp. 042311- ,(2008) , 10.1103/PHYSREVA.77.042311
Daniel Gottesman, Norbert Lütkenhaus, John Preskill, Hoi-Kwong Lo, Security of quantum key distribution with imperfect devices Quantum Information & Computation. ,vol. 4, pp. 325- 360 ,(2004) , 10.26421/QIC4.5-1
Hoi-Kwong Lo, Bing Qi, Chi-Hang Fred Fung, Xiongfeng Ma, Time-shift attack in practical quantum cryptosystems Quantum Information & Computation. ,vol. 7, pp. 73- 82 ,(2007) , 10.5555/2011706.2011709
Lars Lydersen, Johannes Skaar, Security of quantum key distribution with bit and basis dependent detector flaws Quantum Information & Computation. ,vol. 10, pp. 60- 76 ,(2010) , 10.26421/QIC10.1-2-5
Xiang-Bin Wang, Beating the photon-number-splitting attack in practical quantum cryptography. Physical Review Letters. ,vol. 94, pp. 230503- 230503 ,(2005) , 10.1103/PHYSREVLETT.94.230503
J. V. Uspensky, Introduction to mathematical probability University Of Allahabad. ,(1937)
N. Gisin, S. Fasel, B. Kraus, H. Zbinden, G. Ribordy, Trojan-horse attacks on quantum-key-distribution systems Physical Review A. ,vol. 73, pp. 022320- ,(2006) , 10.1103/PHYSREVA.73.022320
Yi Zhao, Bing Qi, Hoi-Kwong Lo, Quantum key distribution with an unknown and untrusted source Physical Review A. ,vol. 77, pp. 052327- ,(2008) , 10.1103/PHYSREVA.77.052327