Security of high speed quantum key distribution with finite detector dead time

作者: Viacheslav Burenkov , Ben Fortescue , Hoi-Kwong Lo , Bing Qi

DOI: 10.26421/QIC14.3-4-2

关键词:

摘要: The security of a high speed quantum key distribution system with finite detector dead time τ is analyzed. When the transmission rate becomes higher than maximum count individual detectors (1/τ), issues affect scheme for sifting bits. Analytical calculations and numerical simulations Bennett-Brassard BB84 protocol are performed. We study Rogers et al.'s (further information available in [D. J. Rogers, C. Bienfang, A. Nakassis, H. Xu, W. Clark, New Phys. 9, 319 (2007)]) presence an active eavesdropper Eve who has power to perform intercept-resend attack. It shown that no longer guaranteed be secure. More specifically, can induce basis-dependent detection efficiency at receiver's end. Modified schemes basis-independent thus secure then introduced. analyze compare these this scenario, calculate simulate their generation rate. 1/(2τ) passive basis selection, 1/τ selection. analysis also extended decoy state one particular scheme.

参考文章(47)
Daniel Gottesman, Norbert Lütkenhaus, John Preskill, Hoi-Kwong Lo, Security of quantum key distribution with imperfect devices Quantum Information & Computation. ,vol. 4, pp. 325- 360 ,(2004) , 10.26421/QIC4.5-1
Hoi-Kwong Lo, Bing Qi, Chi-Hang Fred Fung, Xiongfeng Ma, Time-shift attack in practical quantum cryptosystems Quantum Information & Computation. ,vol. 7, pp. 73- 82 ,(2007) , 10.5555/2011706.2011709
Hoi-Kw g Lo, Bing Qi, Chi-hang Fred Fung, Xi gfeng Ma, Kiyoshi Tamaki, Security proof of quantum key distribution with detection efficiency mismatch Quantum Information & Computation. ,vol. 9, pp. 131- 165 ,(2009) , 10.5555/2021256.2021264
Xiang-Bin Wang, Beating the photon-number-splitting attack in practical quantum cryptography. Physical Review Letters. ,vol. 94, pp. 230503- 230503 ,(2005) , 10.1103/PHYSREVLETT.94.230503
Toyohiro Tsurumaru, Kiyoshi Tamaki, Security proof for quantum-key-distribution systems with threshold detectors Physical Review A. ,vol. 78, pp. 032302- ,(2008) , 10.1103/PHYSREVA.78.032302
Z. L. Yuan, J. F. Dynes, A. J. Shields, Avoiding the blinding attack in QKD Nature Photonics. ,vol. 4, pp. 800- 801 ,(2010) , 10.1038/NPHOTON.2010.269
N. Gisin, S. Fasel, B. Kraus, H. Zbinden, G. Ribordy, Trojan-horse attacks on quantum-key-distribution systems Physical Review A. ,vol. 73, pp. 022320- ,(2006) , 10.1103/PHYSREVA.73.022320
Hoi-Kwong Lo, Hoi Fung Chau, Unconditional Security of Quantum Key Distribution over Arbitrarily Long Distances Science. ,vol. 283, pp. 2050- 2056 ,(1999) , 10.1126/SCIENCE.283.5410.2050
Masato Koashi, Unconditional security of quantum key distribution and the uncertainty principle Journal of Physics: Conference Series. ,vol. 36, pp. 98- 102 ,(2006) , 10.1088/1742-6596/36/1/016