Cargando…
Security evaluation of quantum key distribution with weak basis-choice flaws
Quantum key distribution (QKD) can share an unconditional secure key between two remote parties, but the deviation between theory and practice will break the security of the generated key. In this paper, we evaluate the security of QKD with weak basis-choice flaws, in which the random bits used by A...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Nature Publishing Group UK
2020
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7584668/ https://www.ncbi.nlm.nih.gov/pubmed/33097761 http://dx.doi.org/10.1038/s41598-020-75159-6 |
_version_ | 1783599643856207872 |
---|---|
author | Sun, Shi-Hai Tian, Zhi-Yu Zhao, Mei-Sheng Ma, Yan |
author_facet | Sun, Shi-Hai Tian, Zhi-Yu Zhao, Mei-Sheng Ma, Yan |
author_sort | Sun, Shi-Hai |
collection | PubMed |
description | Quantum key distribution (QKD) can share an unconditional secure key between two remote parties, but the deviation between theory and practice will break the security of the generated key. In this paper, we evaluate the security of QKD with weak basis-choice flaws, in which the random bits used by Alice and Bob are weakly controlled by Eve. Based on the definition of Li et al. (Sci Rep 5:16200, 2015) and GLLP’s analysis, we obtain a tight and analytical bound to estimate the phase error and key rate for both the single photon source and the weak coherent source. Our approach largely increases the key rate from that of the original approach. Finally, we investigate and confirm the security of BB84-QKD with a practical commercial devices. |
format | Online Article Text |
id | pubmed-7584668 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2020 |
publisher | Nature Publishing Group UK |
record_format | MEDLINE/PubMed |
spelling | pubmed-75846682020-10-27 Security evaluation of quantum key distribution with weak basis-choice flaws Sun, Shi-Hai Tian, Zhi-Yu Zhao, Mei-Sheng Ma, Yan Sci Rep Article Quantum key distribution (QKD) can share an unconditional secure key between two remote parties, but the deviation between theory and practice will break the security of the generated key. In this paper, we evaluate the security of QKD with weak basis-choice flaws, in which the random bits used by Alice and Bob are weakly controlled by Eve. Based on the definition of Li et al. (Sci Rep 5:16200, 2015) and GLLP’s analysis, we obtain a tight and analytical bound to estimate the phase error and key rate for both the single photon source and the weak coherent source. Our approach largely increases the key rate from that of the original approach. Finally, we investigate and confirm the security of BB84-QKD with a practical commercial devices. Nature Publishing Group UK 2020-10-23 /pmc/articles/PMC7584668/ /pubmed/33097761 http://dx.doi.org/10.1038/s41598-020-75159-6 Text en © The Author(s) 2020 Open AccessThis article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/. |
spellingShingle | Article Sun, Shi-Hai Tian, Zhi-Yu Zhao, Mei-Sheng Ma, Yan Security evaluation of quantum key distribution with weak basis-choice flaws |
title | Security evaluation of quantum key distribution with weak basis-choice flaws |
title_full | Security evaluation of quantum key distribution with weak basis-choice flaws |
title_fullStr | Security evaluation of quantum key distribution with weak basis-choice flaws |
title_full_unstemmed | Security evaluation of quantum key distribution with weak basis-choice flaws |
title_short | Security evaluation of quantum key distribution with weak basis-choice flaws |
title_sort | security evaluation of quantum key distribution with weak basis-choice flaws |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7584668/ https://www.ncbi.nlm.nih.gov/pubmed/33097761 http://dx.doi.org/10.1038/s41598-020-75159-6 |
work_keys_str_mv | AT sunshihai securityevaluationofquantumkeydistributionwithweakbasischoiceflaws AT tianzhiyu securityevaluationofquantumkeydistributionwithweakbasischoiceflaws AT zhaomeisheng securityevaluationofquantumkeydistributionwithweakbasischoiceflaws AT mayan securityevaluationofquantumkeydistributionwithweakbasischoiceflaws |