4.6 Article

Measurement-device-independenization of quantum key distribution protocols

期刊

CHINESE JOURNAL OF PHYSICS
卷 85, 期 -, 页码 135-142

出版社

ELSEVIER
DOI: 10.1016/j.cjph.2023.06.019

关键词

Quantum key distribution; Measure-device-independent; Qubit; Photon number adding; Photon number purification

向作者/读者索取更多资源

Quantum key distribution (QKD) enables the establishment of a secure secret key based on physical laws. Recent research focuses on measurement-device-independent QKD (MDI-QKD) using insecure measurement devices, eliminating attacks on such devices. However, previous MDI-QKD protocols require joint measurements with low efficiency. Whether all QKD protocols can become measurement-device-independent remains a challenge.
Quantum key distribution (QKD) allows the legitimate partner to establish a secret key whose security only depends on physical laws. In recent years, research on QKD by employing insecure measurement devices, namely measurement-device-independent QKD (MDI-QKD) is increased. MDI-QKD removes all attacks on measurement devices and thus an untrusted third party can be employed for measuring. However, a weakness of previous MDI-QKD protocols is the need for joint measurements such as Bell measurements whose efficiency is low in practice. On the other hand, can all QKD protocols become measurement-device-independent remains a problem. In this paper, we present a scheme making prepare-measure QKD protocols become MDI-QKD protocols, called & PRIME;measurement-device-independenization & PRIME;, which does not need to employ joint measurements and could be efficiently implemented by weak coherence sources. The protocol might look like the detector-device-independent (DDI) protocols but it is also secure under the Trojan horse attack. To illustrate this, we investigate the photon-number-adding (PNA) attack and present a scheme, called & PRIME;photon - number - puri f ication & PRIME;, which can also be employed to close loopholes for previous protocols such as DDI and plug-and-play ones.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据