Do you want to publish a course? Click here

Efficient semiquantum key distribution

103   0   0.0 ( 0 )
 Added by Ming-Ming Wang
 Publication date 2018
and research's language is English




Ask ChatGPT about the research

Quantum cryptography has attracted much attention in recent years. In most existing quantum cryptographic protocols, players usually need the full quantum power of generating, manipulating or measuring quantum states. Semiquantum cryptography was proposed to deal with the issue that some players require only partial quantum power, such as preparing or measuring quantum states in the classical basis, which simplifies the implementations of quantum cryptography. However, the efficiency of the existing semiquantum cryptographic protocols was relatively low from a practical point of view. In this paper, we devise some new semiquantum key distribution (SQKD) protocols which highly improve the efficiency of the most well-known SQKD protocols [Phys. Rev. Lett. 99, 140501 (2007) & Phys. Rev. A 79, 052312 (2009)]. By letting players select their actions asymmetrically, the efficiency of our new protocols can be made asymptotically close to 100%. Besides, one of our proposed protocols also utilizes the discarded X-SIFT bits in the original SQKD protocol, which further improves the efficiency of SQKD. We prove that the proposed SQKD protocols are completely robust against the most general attack.



rate research

Read More

We propose a schematic setup of quantum key distribution (QKD) with an improved secret key rate based on high-dimensional quantum states. Two degrees-of-freedom of a single photon, orbital angular momentum modes, and multi-path modes, are used to encode secret key information. Its practical implementation consists of optical elements that are within the reach of current technologies such as a multiport interferometer. We show that the proposed feasible protocol has improved the secret key rate with much sophistication compared to the previous 2-dimensional protocol known as the detector-device-independent QKD.
Privacy amplification (PA) is an essential part in a quantum key distribution (QKD) system, distilling a highly secure key from a partially secure string by public negotiation between two parties. The optimization objectives of privacy amplification for QKD are large block size, high throughput and low cost. For the global optimization of these objectives, a novel privacy amplification algorithm is proposed in this paper by combining multilinear-modular-hashing and modular arithmetic hashing. This paper proves the security of this hybrid hashing PA algorithm within the framework of both information theory and composition security theory. A scheme based on this algorithm is implemented and evaluated on a CPU platform. The results on a typical CV-QKD system indicate that the throughput of this scheme ([email protected]*10^8 input block size) is twice higher than the best existing scheme (140Mbps@1*10^8 input block size). Moreover, This scheme is implemented on a mobile CPU platform instead of a desktop CPU or a server CPU, which means that this algorithm has a better performance with a much lower cost and power consumption.
Quantum key distribution (QKD) enables unconditionally secure communication between distinct parties using a quantum channel and an authentic public channel. Reducing the portion of quantum-generated secret keys, that is consumed during the authentication procedure, is of significant importance for improving the performance of QKD systems. In the present work, we develop a lightweight authentication protocol for QKD based on a `ping-pong scheme of authenticity check for QKD. An important feature of this scheme is that the only one authentication tag is generated and transmitted during each of the QKD post-processing rounds. For the tag generation purpose, we design an unconditionally secure procedure based on the concept of key recycling. The procedure is based on the combination of almost universal$_2$ polynomial hashing, XOR universal$_2$ Toeplitz hashing, and one-time pad (OTP) encryption. We demonstrate how to minimize both the length of the recycled key and the size of the authentication key, that is required for OTP encryption. As a result, in real case scenarios, the portion of quantum-generated secret keys that is consumed for the authentication purposes is below 1%. Finally, we provide a security analysis of the full quantum key growing process in the framework of universally composable security.
Terahertz (THz) communication is a topic of much research in the context of high-capacity next-generation wireless networks. Quantum communication is also a topic of intensive research, most recently in the context of space-based deployments. In this work we explore the use of THz frequencies as a means to achieve quantum communication within a constellation of micro-satellites in Low-Earth-Orbit (LEO). Quantum communication between the micro-satellite constellation and high-altitude terrestrial stations is also investigated. Our work demonstrates that THz quantum entanglement distribution and THz quantum key distribution are viable deployment options in the micro-satellite context. We discuss how such deployment opens up the possibility for simpler integration of global quantum and wireless networks. The possibility of using THz frequencies for quantum-radar applications in the context of LEO deployments is briefly discussed.
Two-qubit quantum codes have been suggested to obtain better efficiency and higher loss tolerance in quantum key distribution. Here, we propose a two-qubit quantum key distribution protocol based on a mixed basis consisting of two Bell states and two states from the computational basis. All states can be generated from a single entangled photon pair resource by using local operations on only one auxiliary photon. Compared to other schemes it is also possible to deterministically discriminate all states using linear optics. Additionally, our protocol can be implemented with todays technology. When discussing the security of our protocol we find a much improved resistance against certain attacks as compared to the standard BB84 protocol.
comments
Fetching comments Fetching comments
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا