2013
DOI: 10.1103/physreva.88.052302
|View full text |Cite
|
Sign up to set email alerts
|

Quantum-key-distribution protocols without sifting that are resistant to photon-number-splitting attacks

Abstract: We show that replacing the usual sifting step of the standard quantum-key-distribution protocol BB84 [1] by a one-way reverse reconciliation procedure increases its robustness against photonnumber-splitting (pns) attacks to the level of the SARG04 protocol [2,3] while keeping the raw key-rate of BB84. This protocol, which uses the same state and detection than BB84, is the m = 4 member of a protocol-family using m polarization states which we introduce here. We show that the robustness of these protocols again… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 20 publications
0
4
0
Order By: Relevance
“…It is remarked that the use of many polarization angles to increase the robustness of QKD protocols has also been explored in [17,18]. In addition, the scheme described here can in principle be applied to other degrees of freedom of the photons just like the Y00 protocol [19,20] and the state X can be extended to multi-alphabet qudit systems.…”
Section: Three-stage Quantum Cryptographymentioning
confidence: 99%
“…It is remarked that the use of many polarization angles to increase the robustness of QKD protocols has also been explored in [17,18]. In addition, the scheme described here can in principle be applied to other degrees of freedom of the photons just like the Y00 protocol [19,20] and the state X can be extended to multi-alphabet qudit systems.…”
Section: Three-stage Quantum Cryptographymentioning
confidence: 99%
“…This means in other terms that the Bob can not access the information of Alice. This situation expresses the concept of quantum complementarity, and based on this concept Charles Bennett and Gilles Brassard in 1984 devised the idea of quantum cryptography [19], which over the years has become one of the most developed applications of QIT [20,21,22,23,24]. (30).…”
Section: Quantum Complementaritymentioning
confidence: 99%
“…is analyzed by guaranteed the line length up to which a secret key distribution to determine both the protocol itself and the efficiency of error correction in raw keys (Sinil'shchikov and Molotkov, 2019). Proposed a family of sifting-less quantum-key-distribution protocols which use reverse reconciliation, and are based on weak coherent pulses (WCPs) polarized along different directions and also the physical part of the protocol is identical to most experimental implementations of BB84 and SARG04 protocols and they differ only in classical communications and data processing (Grazioso and Grosshans, 2013). The performance analysis of SARG04 and KMB09 protocols was presented with respect to protocol efficiency, Quantum Bit Error Rate (QBER), and robustness against eavesdropping (Lopes and Sarwade, 2015).…”
Section: Introductionmentioning
confidence: 99%