Skip main navigation

Cookies Notification

We use cookies on this site to enhance your user experience. By continuing to browse the site, you consent to the use of our cookies. Learn More
×

System Upgrade on Tue, May 28th, 2024 at 2am (EDT)

Existing users will be able to log into the site and access content. However, E-commerce and registration of new users may not be available for up to 12 hours.
For online purchase, please visit us again. Contact us at customercare@wspc.com for any enquiries.

SEARCH GUIDE  Download Search Tip PDF File

  • articleNo Access

    NOISE TOLERANCE OF THE BB84 PROTOCOL WITH RANDOM PRIVACY AMPLIFICATION

    This paper shows that the random privacy amplification is secure with a higher key rate than Mayers' evaluation at the same error rate in the BB84 protocol with one-way or two-way classical communications. There exists only Mayers' evaluation on the secure key rate with random privacy amplification that is applicable to the BB84 protocol with two-way classical communications. Our result improves the secure key rate of the random privacy amplification in the BB84 protocol with two-way classical communications.

  • articleNo Access

    RAW-DATA ATTACKS IN QUANTUM CRYPTOGRAPHY WITH PARTIAL TOMOGRAPHY

    We consider a variant of the BB84 protocol for quantum cryptography, the prototype of tomographically incomplete protocols, where the key is generated by one-way communication rather than the usual two-way communication. Our analysis, backed by numerical evidence, establishes thresholds for eavesdropping attacks on the raw data and on the generated key at quantum bit error rates of 10% and 6.15%, respectively. Both thresholds are lower than the threshold for unconditional security in the standard BB84 protocol.

  • articleNo Access

    A GAME THEORETIC APPROACH TO STUDY THE QUANTUM KEY DISTRIBUTION BB84 PROTOCOL

    Quantum cryptography uses quantum mechanics to guarantee secure communication. BB84 is a widely used quantum key distribution that provides a way for two parties, a sender, Alice, and a receiver, Bob, to share an unconditionally secure key in the presence of an eavesdropper, Eve.

    Three different criteria can be assumed to study the BB84 protocol. They are the efficiency of the protocol, the probability that Eve remains undetected, and the amount of knowledge Eve has about Alice's bit sequence.

    In a previous approach, we only considered the probability that Eve remains undetected. We viewed this protocol as a three player static game in which Alice and Bob were two cooperative players and Eve was a competitive one. In our game model, Alice's and Bob's objective was to maximize the probability of detecting Eve, while Eve's objective was to minimize this probability. In this paper, our previous effort is extended and we also consider the other two criteria, i.e. the efficiency of the protocol and the amount of knowledge Eve has about Alice's bit sequence. Using these models, we show how game theory can be used to find the strategies for Alice, Bob and Eve.

  • articleNo Access

    A two-dimensional quantum key distribution protocol based on polarization-phase encoding

    In this paper, we introduce a new quantum key distribution protocol, which we refer to as polarization-phase (PoP) protocol. In this protocol, two degrees of photonic freedom of the same particle in a hybrid manner are used to encode the information in the format of two- or high-dimensional quantum states (qubits and qudits, respectively). Here, we only discuss the qubit version of the general PoP protocol (we refer to two-dimensional PoP (TD-PoP) protocol) as an interesting extension for the standard BB84 protocol. We investigate the performance of the TD-PoP protocol using infinite-key analysis against restricted individual attacks, i.e. the intercept-resend and photon number splitting attacks, in both ideal single-photon and Poisson (attenuated laser) sources. In addition, we demonstrate that this protocol, despite using two physical dimensions, is simple and fully has empirical implementation capability. Ability to extract two bits of information from each detection event, and increasing the sifting parameter, the secure key rate, and the likelihood of detection of an eavesdropper, are the advantages of the TD-PoP protocol compared to the standard polarization- or phase-encoded BB84 protocol.

  • articleNo Access

    Quantum key distribution with relay-assisted scheme over long atmospheric channels

    A relay-assisted scheme for quantum key distribution (QKD) over long atmospheric channels is proposed. In this scheme, a polarization orbital-angular-moment with measurement-device-independent (POAM-MDI) QKD for quantum relay is designed to both reconstruct the turbulence-degraded qubits and redirect the qubits to the next relay or to Bob who performs detection randomization. The proposed scheme will neither be time-consuming nor lead to unstable or even intermittent in volatile environments. Theoretical and numerical results show that the proposed relay-assisted scheme outperforms the conventional direct transmission over long atmospheric channels.