Security Analysis of the Multi-Photon Three-Stage Quantum Key Distribution
نویسندگان
چکیده
منابع مشابه
Security Analysis of the Multi-photon Three-stage Quantum Key Distribution
This paper presents a multi-stage, multi-photon quantum key distribution protocol based on the double-lock cryptography. It exploits the asymmetry in the detection strategies between the legitimate users and the eavesdropper. The security analysis of the protocol is presented with coherent states under the interceptresend attack, the photon number splitting attack, and the man-in-the-middle att...
متن کاملSecurity of Quantum Key Distribution
We construct a new quantum key distribution scheme and prove its security against the most general type of attacks and the most general type of noises allowed by quantum physics. The novel technique we use is reduction from a quantum scheme to a classical scheme. We first show that, rather surprisingly, the proof of security of our quantum key distribution in the error-free case can be reduced ...
متن کاملSecurity of EPR-based Quantum Key Distribution using three bases
• m, the length (in bits) of the private key to be generated. • ǫ, the maximum threshold value for the error rate during the quantum transmission (ǫ < 1/4). • τ , a security constant such that ǫ 1−ǫ < ǫ 1−ǫ + τ < 1. • the security parameter r. It must be large enough so that Alice and Bob can find a binary matrix K of size m × r such that any linear combination of rows of K that contains at lea...
متن کاملSecurity of quantum key distribution
Der sicheren Übertragung und Aufbewahrung vertraulicher Daten kommt in unserer von Information dominierten Gesellschaft immer grössere Bedeutung zu. Die heute gebräuchlichen Verfahren zur Datenverschlüsselung bieten allerdings nur berschränkte, so-genannt berechenmässige, Sicherheit. Das bedeutet, dass diese prinzipiell von einem Angreifer, der über genügend Rechenleistung (zum Beispiel einen, ...
متن کاملAn Automated Analysis of the Security of Quantum Key Distribution
This paper discusses the use of computer–aided verification as a practical means for analysing quantum information systems; specifically, the BB84 protocol for quantum key distribution is examined using this method. This protocol has been shown to be unconditionally secure against all attacks in an information–theoretic setting, but the relevant security proof requires a thorough understanding ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal on Cryptography and Information Security
سال: 2015
ISSN: 1839-8626
DOI: 10.5121/ijcis.2015.5401