Passive scheme analysis for resolving an untrusted source problem in quantum key distribution

نویسندگان

  • Xiang Peng
  • Hong Guo
چکیده

As a practical method, the passive scheme has been used to analyze the security of an untrusted source in quantum key distribution. In the passive scheme, one can utilize average-photon-number (APN) monitor, photon-number-distribution (PND) monitor and photon-number analyzer (PNA) to achieve the unconditional security with using BB84 protocol or decoy-state protocol. In this paper, the ClopperPearson confidence interval is estimated to analyze the statistical fluctuation due to finite number of measurements. Two cases of independent additive detection noise, i.e., Poissonian and Gaussian noise, are considered and discussed in the passive scheme, respectively. Our analysis can be directly applied in the “Plug & Play” QKD system. PACS numbers: 03.67.Dd, 03.67.Hk Passive scheme analysis for resolving an untrusted source problem in quantum key distribution2

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security analysis of an untrusted source for quantum key distribution: passive approach

We present a passive approach to the security analysis of quantum key distribution (QKD) with an untrusted source. A complete proof of its unconditional security is also presented. This scheme has significant advantages in real-life implementations as it does not require fast optical switching or a quantum random number generator. The essential idea is to use a beam splitter to split each input...

متن کامل

The Security of SARG04 Protocol in Plug and Play Quantum Key Distribution system with an Untrusted Source

The SARG04 protocol is one of the most frequently used protocol in commercial plug-and-play quantum key distribution (QKD) system, where an eavesdropper can completely control or change the photon number statistics of the QKD source. To ensure the security of SARG04 protocol in plug-and-play QKD system with an unknown and untrusted source, the bounds of a few statistical parameters of the sourc...

متن کامل

Detector decoy quantum key distribution

Photon number resolving detectors can enhance the performance of many practical quantum cryptographic setups. In this paper, we employ a simple method to estimate the statistics provided by such a photon number resolving detector using only a threshold detector together with a variable attenuator. This idea is similar in spirit to that of the decoy state technique, and is specially suited for t...

متن کامل

Hybrid Key pre-distribution scheme for wireless sensor network based on combinatorial design

Key distribution is an important problem in wireless sensor networks where sensor nodesare randomly scattered in adversarial environments.Due to the random deployment of sensors, a list of keys must be pre-distributed to each sensor node before deployment. To establish a secure communication, two nodes must share common key from their key-rings. Otherwise, they can find a key- path in which ens...

متن کامل

Measurement-device-independent quantum communication with an untrusted source

Measurement-device-independent quantum key distribution (MDI-QKD) can provide enhanced security compared to traditional QKD, and it constitutes an important framework for a quantum network with an untrusted network server. Still, a key assumption in MDI-QKD is that the sources are trusted. We propose here a MDI quantum network with a single untrusted source. We have derived a complete proof of ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009