On the information - splitting essence of two types of quantum key distribution protocols
نویسنده
چکیده
With the help of a simple quantum key distribution (QKD) scheme, we discuss the relation between BB84-type protocols and two-step-type ones. It is shown that they have the same essence, i.e., information-splitting. More specifically, the similarity between them includes (1) the carrier state is split into two parts which will be sent one by one; (2) the possible states of each quantum part are indistinguishable; (3) anyone who obtains both parts can recover the initial carrier state and then distinguish it from several possible states. This result is useful for related scheme designing and security analyzing.
منابع مشابه
Diffie-Hellman type key exchange protocols based on isogenies
In this paper, we propose some Diffie-Hellman type key exchange protocols using isogenies of elliptic curves. The first method which uses the endomorphism ring of an ordinary elliptic curve $ E $, is a straightforward generalization of elliptic curve Diffie-Hellman key exchange. The method uses commutativity of the endomorphism ring $ End(E) $. Then using dual isogenies, we propose...
متن کاملSplitting information securely with entanglement
Although many quantum security tools have been proposed, many of them are quantum secret key distribution protocols. However, we naturally wish to construct quantum cryptosystems different from the conventional cryptosystems. In this paper, first, we show simple methods with prior entanglement in order to split a party’s message among some parties securely. Moreover, as an application, we also ...
متن کاملSecurity analysis of the time-coding quantum key distribution protocols
We report the security analysis of time-coding quantum key distribution protocols. The protocols make use of coherent single-photon pulses. The key is encoded in the photon time-detection. The use of coherent superposition of states allows to detect eavesdropping of the key. We give a mathematical model of a first protocol from which we derive a second, simpler, protocol. We derive the security...
متن کاملSecurity Analysis of the Multi-photon Three-stage Quantum Key Distribution
This paper presents a multi-stage, multi-photon quantum key distribution protocol based on the double-lock cryptography. It exploits the asymmetry in the detection strategies between the legitimate users and the eavesdropper. The security analysis of the protocol is presented with coherent states under the interceptresend attack, the photon number splitting attack, and the man-in-the-middle att...
متن کاملQuantum Flows for Secret Key Distribution in the Presence of the Photon Number Splitting Attack
Physical implementations of quantum key distribution (QKD) protocols, like the Bennett-Brassard (BB84), are forced to use attenuated coherent quantum states, because the sources of single photon states are not functional yet for QKD applications. However, when using attenuated coherent states, the relatively high rate of multi-photonic pulses introduces vulnerabilities that can be exploited by ...
متن کامل