首页> 外文OA文献 >Information-theoretic security proof of differential-phase-shift quantum key distribution protocol based on complementarity
【2h】

Information-theoretic security proof of differential-phase-shift quantum key distribution protocol based on complementarity

机译:差分相移量子点的信息论安全性证明   基于互补性的密钥分发协议

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

We show the information-theoretic security proof of thedifferential-phase-shift (DPS) quantum key distribution (QKD) protocol based onthe complementarity approach [arXiv:0704.3661 (2007)]. Our security proofprovides a slightly better key generation rate compared to the one derived inthe previous security proof in [arXiv:1208.1995 (2012)] that is based on theShor-Preskill approach [Phys. Rev. Lett. ${\bf 85}$, 441 (2000)]. Thisimprovement is obtained because the complementarity approach can employ moredetailed information on Alice's sending state in estimating the leakedinformation to an eavesdropper. Moreover, we remove the necessity of thenumerical calculation that was needed in the previous analysis to estimate theleaked information. This leads to an advantage that our security proof enablesus to evaluate the security of the DPS protocol with any block size. This paperhighlights one of the fundamental differences between the Shor-Preskill and thecomplementarity approaches.
机译:我们展示了基于互补性方法[arXiv:0704.3661(2007)]的差分相移(DPS)量子密钥分配(QKD)协议的信息理论安全证明。与先前的安全证明相比,我们的安全证明提供了更高的密钥生成率,后者基于[arXiv:1208.1995(2012)]基于Shor-Preskill方法[Phys。牧师$ {\ bf 85} $,441(2000)]。之所以能够获得这种改进,是因为互补方法可以在估计向窃听者泄漏的信息时采用有关爱丽丝发送状态的更多详细信息。此外,我们消除了先前分析中估计泄漏信息所需的数值计算的必要性。这带来了一个优势,即我们的安全证明使我们能够评估任何块大小的DPS协议的安全性。本文重点介绍了Shor-Preskill方法与互补方法之间的根本区别之一。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号