A QKD Protocol Extendable to Support Entanglement and Reduce Unauthorized Information Gain by Randomizing the Bases Lists with Key Values and Invalidate Explicit Privacy Amplification

作者: N. Srinivasan , L. Sudarsan , M. Kasi Rajan , C. Sanjeevakumar , R. Venkatesh

DOI:

关键词:

摘要: This paper suggests an improvement to the BB84 scheme in Quantum key distribution. The original has its weakness letting quantifiably more information gain eavesdropper during public announcement of unencrypted bases lists. security secret comes at expense final length. We aim exploiting randomness preparation (measurement) basis and bit values encoded (observed), so as randomize lists before they are communicated over channel. A proof is given for our proven that protocol results lesser by Eve comparison with other extensions. Moreover, analysis made on feasibility proposal such support entanglement based QKD. performance compared terms upper lower bounds tolerable error rate. also quantify (by Eve) mathematically using familiar approach concept Shannon entropy. models attack interference a multi-access quantum Besides, this hints invalidation separate privacy amplification step "prepare-and-measure" protocols general.

参考文章(15)
Isaac L. Chuang, Michael A. Nielsen, Quantum Computation and Quantum Information ,(2000)
Markus Aspelmeyer, Anton Zeilinger, Časlav Brukner, Hannes R. Böhm, Paul S. Böhm, Exploiting the randomness of the measurement basis in quantum cryptography: Secure Quantum Key Growing without Privacy Amplification arXiv: Quantum Physics. ,(2004)
Paul Adrien Maurice Dirac, The Principles of Quantum Mechanics ,(1930)
Bruno Huttner, Artur K. Ekert, Information Gain in Quantum Eavesdropping Journal of Modern Optics. ,vol. 41, pp. 2455- 2466 ,(1994) , 10.1080/09500349414552301
Peter W. Shor, John Preskill, Simple proof of security of the BB84 quantum key distribution protocol Physical Review Letters. ,vol. 85, pp. 441- 444 ,(2000) , 10.1103/PHYSREVLETT.85.441
Christopher A. Fuchs, Christopher A. Fuchs, Information Gain vs. State Disturbance in Quantum Theory Protein Science. ,vol. 46, pp. 535- 565 ,(1998) , 10.1002/(SICI)1521-3978(199806)46:4/5<535::AID-PROP535>3.0.CO;2-0
D.P. DiVincenzo, D.W. Leung, B.M. Terhal, Quantum data hiding IEEE Transactions on Information Theory. ,vol. 48, pp. 580- 598 ,(2002) , 10.1109/18.985948
C.H. Bennett, P.W. Shor, Quantum information theory IEEE Transactions on Information Theory. ,vol. 44, pp. 2724- 2742 ,(1998) , 10.1109/18.720553
Sheng-Mei Zhao, Fei Li, Bao-Yu Zheng, A proof of security of quantum key distribution in probabilistic clone scheme international conference on communication technology. ,vol. 2, pp. 1507- 1509 ,(2003) , 10.1109/ICCT.2003.1209814