2015
DOI: 10.5121/ijcis.2015.5401
|View full text |Cite
|
Sign up to set email alerts
|

Security Analysis of the Multi-Photon Three-Stage Quantum Key Distribution

Abstract: This paper presents a multi-stage, multi-photon quantum key distribution protocol based on the double-lock cryptography. It exploits the asymmetry in the detection strategies between the legitimate users and the eavesdropper. The security analysis of the protocol is presented with coherent states under the interceptresend attack, the photon number splitting attack, and the man-in-the-middle attack. It is found that the mean photon number can be much larger 1. This complements the recent interest in multi-photo… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 32 publications
0
5
0
Order By: Relevance
“…As depicted in Figure 5, it is clear that the total loss increased with the increment of the link range for all beams. As stated before, the total loss that comes from atmospheric and geometrical attenuation can be generated using Equation ( 6) for the single beam while Equation (7) for the multiple beams. It can be seen from the graph that multiple beams are able to reduce total loss compared to the single beam.…”
Section: Numerical Results and Performance Analysismentioning
confidence: 99%
See 2 more Smart Citations
“…As depicted in Figure 5, it is clear that the total loss increased with the increment of the link range for all beams. As stated before, the total loss that comes from atmospheric and geometrical attenuation can be generated using Equation ( 6) for the single beam while Equation (7) for the multiple beams. It can be seen from the graph that multiple beams are able to reduce total loss compared to the single beam.…”
Section: Numerical Results and Performance Analysismentioning
confidence: 99%
“…The concept of the multiphoton QKD [3,7,8] is to use rotational polarization to exchange the key. By applying the state of polarization, the system does not require the output of one of the four states as in the BB84 scheme.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Suppose Alice and Bob consume m check bits during their final test. The probability that Eve is not detected on a given bit is 3 4 , or 3 4 m on all m bits. A more detailed treatment of the above attack must compare Bob's and Eve's information gain during her attack.…”
Section: Intuitive Securitymentioning
confidence: 99%
“…Another direction in cryptography is to provide practicable tools embracing experimental limitations, e.g. quantum key distribution with pulses having mean photon number much larger than one [3].…”
Section: Introductionmentioning
confidence: 99%