Efficient quantum key distribution scheme and a proof of its unconditional security
From MaRDI portal
Abstract: We devise a simple modification that essentially doubles the efficiency of the BB84 quantum key distribution scheme proposed by Bennett and Brassard. We also prove the security of our modified scheme against the most general eavesdropping attack that is allowed by the laws of physics. The first major ingredient of our scheme is the assignment of significantly different probabilities to the different polarization bases during both transmission and reception, thus reducing the fraction of discarded data. A second major ingredient of our scheme is a refined analysis of accepted data: We divide the accepted data into various subsets according to the basis employed and estimate an error rate for each subset *separately*. We then show that such a refined data analysis guarantees the security of our scheme against the most general eavesdropping strategy, thus generalizing Shor and Preskill's proof of security of BB84 to our new scheme. Up till now, most proposed proofs of security of single-particle type quantum key distribution schemes have relied heavily upon the fact that the bases are chosen uniformly, randomly and independently. Our proof removes this symmetry requirement.
Recommendations
Cited in
(98)- Quantum Key Distribution Scheme with High Efficiency
- SECURITY OF QUANTUM KEY DISTRIBUTION
- Proof of unconditional security of six-state quantum key distribution scheme
- Multi-partite entanglement can speed up quantum key distribution in networks
- Memory-assisted measurement-device-independent quantum key distribution
- Security of quantum key distribution with bit and basis dependent detector flaws
- Analysis of polarization coding for subcarrier multiplexing quantum key distribution
- Chau-Wang-Wong17 scheme is experimentally more feasible than the six-state scheme
- Universal construction of a full quantum one-way function
- Practical aspects of measurement-device-independent quantum key distribution
- Key-leakage evaluation of authentication in quantum key distribution with finite resources
- Quantum key distribution with quantum walks
- Security proof for round-robin differential phase shift QKD
- A modified quantum key distribution without public announcement bases against photon-number-splitting attack
- The Locking-Decoding Frontier for Generic Dynamics
- Efficient semiquantum key distribution without entanglement
- Higher-rate quantum key expansion scheme
- The performance of three-intensity decoy-state measurement-device-independent quantum key distribution
- Quantum mutual implicit authentication key agreement protocol without entanglement with key recycling
- Quantum private comparison protocol with linear optics
- New quantum key distribution scheme based on random hybrid quantum channel with EPR pairs and GHZ states
- Comment on ``Reply to comment on `Efficient high-capacity quantum secret sharing with two-photon entanglement'
- Unconditionally Secure Key Distribution in Higher Dimensions by Depolarization
- Toward secure communication using intra-particle entanglement
- Spherical-code key-distribution protocols for qubits
- Decoherence can help quantum cryptographic security
- Threshold proxy quantum signature scheme with threshold shared verification
- An efficient quantum secret sharing protocol with orthogonal product states
- Improvement of one quantum encryption scheme
- Quantum Key Distribution
- Discrete-phase-randomized coherent state source and its application in quantum key distribution
- Finite-key analysis of high-dimensional time-energy entanglement-based quantum key distribution
- No-signaling quantum key distribution: solution by linear programming
- Encoding optimum of a quantum key distribution model
- Efficient quantum key distribution with trines of reference-frame-free qubits
- STABLE AND DETERMINISTIC QUANTUM KEY DISTRIBUTION BASED ON DIFFERENTIAL PHASE SHIFT
- Quantum cryptography without public announcement of bases
- Security of a single-state semi-quantum key distribution protocol
- Multiparty quantum secret splitting and quantum state sharing
- New quantum private comparison protocol without entanglement
- Significance of Bell states over four-qubit entangled states in quantum bidirectional direct communication protocols
- Sampling in a quantum population, and applications
- A game-theoretic security framework for quantum cryptography: performance analysis and application
- Efficient high-capacity quantum secret sharing with two-photon entanglement
- Performance improvement of unidimensional continuous-variable quantum key distribution using zero-photon quantum catalysis
- Quantum Bell states-based anonymous voting with anonymity trace
- Narrow basis angle doubles secret key in the BB84 protocol
- Measure-resend authenticated semi-quantum key distribution with single photons
- An asymmetric dynamic multiparty quantum secret sharing against active attacks
- Generalized multiparty quantum single-qutrit-state sharing
- QUANTUM SECURE CONDITIONAL DIRECT COMMUNICATION VIA EPR PAIRS
- Semi-quantum cryptography
- The locking-decoding frontier for generic dynamics
- EFFICIENT QUANTUM KEY DISTRIBUTION SCHEME USING THE BELL STATE MEASUREMENT
- Improved one-way rates for BB84 and 6-state protocols
- Improving the secure key rate and error tolerance of the interferometer-based time-frequency encoding QKD system
- Reliability of Calderbank–Shor–Steane codes and security of quantum key distribution
- Efficiency of the quantum key distribution systems -- a comparative study of BB84 protocol with its improved versions
- Efficient bit sifting scheme of post-processing in quantum key distribution
- High-efficient quantum key agreement protocol with entanglement measure
- Passive Decoy State Quantum Key Distribution
- Decoy-state reference-frame-independent quantum key distribution with the single-photon-added coherent source
- Optimal axis compensation in quantum key distribution protocols over unital channels
- Quantum key distribution using a two-way quantum channel
- QUANTUM KEY-DISTRIBUTION PROTOCOL FOR N-BIT SECRET MESSAGE COMMUNICATION
- Composable security against collective attacks of a modified BB84 QKD protocol with information only in one basis
- Error-rejecting Bennett-Brassard-Mermin quantum key distribution protocol based on linear optics over a collective-noise channel
- Evaluation of eavesdropping error-rates in higher-dimensional QKD system implemented using dynamic spatial modes
- Efficient quantum key distribution protocol based on classical-quantum polarized channels
- Sifting attacks in finite-size quantum key distribution
- Multiparty semiquantum key agreement without entanglement
- Quantum secure direct communication network with Einstein-Podolsky-Rosen pairs
- Security of BB84 with weak randomness and imperfect qubit encoding
- Quantum cryptography
- Unconditional security in quantum cryptography
- A game theoretic approach to study the quantum key distribution BB84 protocol
- Asymptotic security analysis of teleportation-based quantum cryptography
- Secret sharing based on quantum Fourier transform
- Infeasibility of quantum cryptography without eavesdropping check
- Novel encoding-decoding procedure for quantum key distribution
- A proof of the security of quantum key distribution (extended abstract)
- Polarization and orbital angular momentum coupling for high-dimensional measurement-device-independent quantum key distribution protocol
- Finite-key security analysis for multilevel quantum key distribution
- A monogamy-of-entanglement game with applications to device-independent quantum cryptography
- A secure authenticated semi-quantum key distribution scheme for semi-quantum environments
- Fundamental finite key limits for one-way information reconciliation in quantum key distribution
- An improved proposal on the practical quantum key distribution with biased basis
- Parameter optimization in biased decoy-state quantum key distribution with both source errors and statistical fluctuations
- Security proof of quantum key distribution with detection efficiency mismatch
- Fault-tolerate quantum key distribution over a collective-noise channel
- Secure quantum network coding based on quantum homomorphic message authentication
- Two-way unclonable encryption with a vulnerable sender
- Quantum homomorphic signature based on Bell-state measurement
- Efficient quantum key distribution using Fibonacci-number coding with a biased basis choice
- Simple analysis of security of the BB84 quantum key distribution protocol
- Quantum key evolution and its applications
- Proof of security of quantum key distribution with two-way classical communications
- DOUBLING THE CAPACITY OF QUANTUM KEY DISTRIBUTION BY USING BOTH POLARIZATION AND DIFFERENTIAL PHASE SHIFT
This page was built for publication: Efficient quantum key distribution scheme and a proof of its unconditional security
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q814839)