File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.26421/QIC7.5-6
- Scopus: eid_2-s2.0-34547506608
- WOS: WOS:000248425500002
- Find via
Supplementary
- Citations:
- Appears in Collections:
Article: Security of quantum key distribution using weak coherent states with nonrandom phases
Title | Security of quantum key distribution using weak coherent states with nonrandom phases |
---|---|
Authors | |
Keywords | Quantum cryptography Quantum key distribution |
Issue Date | 2007 |
Publisher | Rinton Press. The Journal's web site is located at http://www.rintonpress.com/journals/qiconline.html |
Citation | Quantum Information and Computation, 2007, v. 7, n. 5-6, p. 431-458 How to Cite? |
Abstract | We prove the security of the Bennett-Brassard (BB84) quantum key distribution protocol in the case where the key information is encoded in the relative phase of a coherent-state reference pulse and a weak coherent-state signal pulse, as in some practical implementations of the protocol. In contrast to previous work, our proof applies even if the eavesdropper knows the phase of the reference pulse, provided that this phase is not modulated by the source, and even if the reference pulse is bright. The proof also applies to the case where the key is encoded in the photon polarization of a weak coherent-state pulse with a known phase, but only if the phases of the four BB84 signal states are judiciously chosen. The achievable key generation rate scales quadratically with the transmission in the channel, just as for BB84 with phase-randomized weak coherent-state signals (when decoy states are not used). For the case where the phase of the reference pulse is strongly modulated by the source, we exhibit an explicit attack that allows the eavesdropper to learn every key bit in a parameter regime where a protocol using phase-randomized signals is provably secure. © Rinton Press. |
Persistent Identifier | http://hdl.handle.net/10722/285600 |
ISSN | 2023 Impact Factor: 0.7 2023 SCImago Journal Rankings: 0.236 |
ISI Accession Number ID |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lo, Hoi Kwong | - |
dc.contributor.author | Preskill, John | - |
dc.date.accessioned | 2020-08-18T04:56:10Z | - |
dc.date.available | 2020-08-18T04:56:10Z | - |
dc.date.issued | 2007 | - |
dc.identifier.citation | Quantum Information and Computation, 2007, v. 7, n. 5-6, p. 431-458 | - |
dc.identifier.issn | 1533-7146 | - |
dc.identifier.uri | http://hdl.handle.net/10722/285600 | - |
dc.description.abstract | We prove the security of the Bennett-Brassard (BB84) quantum key distribution protocol in the case where the key information is encoded in the relative phase of a coherent-state reference pulse and a weak coherent-state signal pulse, as in some practical implementations of the protocol. In contrast to previous work, our proof applies even if the eavesdropper knows the phase of the reference pulse, provided that this phase is not modulated by the source, and even if the reference pulse is bright. The proof also applies to the case where the key is encoded in the photon polarization of a weak coherent-state pulse with a known phase, but only if the phases of the four BB84 signal states are judiciously chosen. The achievable key generation rate scales quadratically with the transmission in the channel, just as for BB84 with phase-randomized weak coherent-state signals (when decoy states are not used). For the case where the phase of the reference pulse is strongly modulated by the source, we exhibit an explicit attack that allows the eavesdropper to learn every key bit in a parameter regime where a protocol using phase-randomized signals is provably secure. © Rinton Press. | - |
dc.language | eng | - |
dc.publisher | Rinton Press. The Journal's web site is located at http://www.rintonpress.com/journals/qiconline.html | - |
dc.relation.ispartof | Quantum Information and Computation | - |
dc.subject | Quantum cryptography | - |
dc.subject | Quantum key distribution | - |
dc.title | Security of quantum key distribution using weak coherent states with nonrandom phases | - |
dc.type | Article | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.scopus | eid_2-s2.0-34547506608 | - |
dc.identifier.volume | 7 | - |
dc.identifier.issue | 5-6 | - |
dc.identifier.spage | 431 | - |
dc.identifier.epage | 458 | - |
dc.identifier.isi | WOS:000248425500002 | - |
dc.identifier.partofdoi | 10.26421/QIC7.5-6 | - |
dc.identifier.issnl | 1533-7146 | - |