File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.26421/QIC14.3-4
- Scopus: eid_2-s2.0-84890381942
- WOS: WOS:000333068200002
- Find via
Supplementary
- Citations:
- Appears in Collections:
Article: Security of high speed quantum key distribution with finite detector dead time
Title | Security of high speed quantum key distribution with finite detector dead time |
---|---|
Authors | |
Issue Date | 2014 |
Citation | Quantum Information and Computation, 2014, v. 14, n. 3-4, p. 217-235 How to Cite? |
Abstract | The security of a high speed quantum key distribution system with finite detector dead time τ is analyzed. When the transmission rate becomes higher than the maximum count rate of the individual detectors (1/τ), security issues affect the scheme for sifting bits. Analytical calculations and numerical simulations of the Bennett-Brassard BB84 protocol are performed. We study Rogers et al.'s scheme (further information is available in [D. J. Rogers, J. C. Bienfang, A. Nakassis, H. Xu, and C. W. Clark, New J. Phys. 9, 319 (2007)]) in the presence of an active eavesdropper Eve who has the power to perform an intercept-resend attack. It is shown that Rogers et al.'s scheme is no longer guaranteed to be secure. More specifically, Eve can induce a basis-dependent detection efficiency at the receiver's end. Modified key sifting schemes that are basis-independent and thus secure in the presence of dead time and an active eavesdropper are then introduced. We analyze and compare these secure sifting schemes for this active Eve scenario, and calculate and simulate their key generation rate. It is shown that the maximum key generation rate is 1/(2τ) for passive basis selection, and 1/τ for active basis selection. The security analysis for finite detector dead time is also extended to the decoy state BB84 protocol for one particular secure sifting scheme. © Rinton Press. |
Persistent Identifier | http://hdl.handle.net/10722/285720 |
ISSN | 2021 Impact Factor: 1.069 2020 SCImago Journal Rankings: 0.504 |
ISI Accession Number ID |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Burenkov, Viacheslav | - |
dc.contributor.author | Qi, Bing | - |
dc.contributor.author | Fortescue, Ben | - |
dc.contributor.author | Lo, Hoi Kwong | - |
dc.date.accessioned | 2020-08-18T04:56:28Z | - |
dc.date.available | 2020-08-18T04:56:28Z | - |
dc.date.issued | 2014 | - |
dc.identifier.citation | Quantum Information and Computation, 2014, v. 14, n. 3-4, p. 217-235 | - |
dc.identifier.issn | 1533-7146 | - |
dc.identifier.uri | http://hdl.handle.net/10722/285720 | - |
dc.description.abstract | The security of a high speed quantum key distribution system with finite detector dead time τ is analyzed. When the transmission rate becomes higher than the maximum count rate of the individual detectors (1/τ), security issues affect the scheme for sifting bits. Analytical calculations and numerical simulations of the Bennett-Brassard BB84 protocol are performed. We study Rogers et al.'s scheme (further information is available in [D. J. Rogers, J. C. Bienfang, A. Nakassis, H. Xu, and C. W. Clark, New J. Phys. 9, 319 (2007)]) in the presence of an active eavesdropper Eve who has the power to perform an intercept-resend attack. It is shown that Rogers et al.'s scheme is no longer guaranteed to be secure. More specifically, Eve can induce a basis-dependent detection efficiency at the receiver's end. Modified key sifting schemes that are basis-independent and thus secure in the presence of dead time and an active eavesdropper are then introduced. We analyze and compare these secure sifting schemes for this active Eve scenario, and calculate and simulate their key generation rate. It is shown that the maximum key generation rate is 1/(2τ) for passive basis selection, and 1/τ for active basis selection. The security analysis for finite detector dead time is also extended to the decoy state BB84 protocol for one particular secure sifting scheme. © Rinton Press. | - |
dc.language | eng | - |
dc.relation.ispartof | Quantum Information and Computation | - |
dc.title | Security of high speed quantum key distribution with finite detector dead time | - |
dc.type | Article | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.scopus | eid_2-s2.0-84890381942 | - |
dc.identifier.volume | 14 | - |
dc.identifier.issue | 3-4 | - |
dc.identifier.spage | 217 | - |
dc.identifier.epage | 235 | - |
dc.identifier.isi | WOS:000333068200002 | - |
dc.identifier.partofdoi | 10.26421/QIC14.3-4 | - |
dc.identifier.issnl | 1533-7146 | - |