2005
DOI: 10.1103/physrevlett.94.040503
|View full text |Cite
|
Sign up to set email alerts
|

Unconditional Security of a Three State Quantum Key Distribution Protocol

Abstract: Quantum key distribution (QKD) protocols are cryptographic techniques with security based only on the laws of quantum mechanics. Two prominent QKD schemes are the Bennett-Brassard 1984 and Bennett 1992 protocols that use four and two quantum states, respectively. In 2000, Phoenix et al. proposed a new family of three-state protocols that offers advantages over the previous schemes. Until now, an error rate threshold for security of the symmetric trine spherical code QKD protocol has been shown only for the tri… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

1
98
0

Year Published

2006
2006
2022
2022

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 90 publications
(99 citation statements)
references
References 16 publications
1
98
0
Order By: Relevance
“…(14) holds true in the asymptotic limit in which the block size for each photon number ν is large. As we show in Appendix B, with a more detailed analysis using Azuma's inequality [11,12], we can show that it holds true if the total block size is large.…”
Section: The Phase Error Estimationmentioning
confidence: 91%
“…(14) holds true in the asymptotic limit in which the block size for each photon number ν is large. As we show in Appendix B, with a more detailed analysis using Azuma's inequality [11,12], we can show that it holds true if the total block size is large.…”
Section: The Phase Error Estimationmentioning
confidence: 91%
“…However, our results also hold against coherent attacks by just applying either the quantum De Finetti theorem [23] or Azuma's inequality [24][25][26] (see Appendix A for details). Moreover, for simplicity, we consider the asymptotic scenario where Alice sends Bob an infinite number of signals.…”
mentioning
confidence: 87%
“…2 in the l th run conditioned on all previous measurement outcomes, we can determine the actual occurrence number of the corresponding events (see Refs. [25,26] for a proof of this statement).…”
mentioning
confidence: 99%
See 1 more Smart Citation
“…If error rate exceeds beyond acceptable error threshold after the legitimate parties crosschecking afraction of their sifted keys, eavesdropping occurred and the established sifted key isdiscarded without losing any valuable information [13 -18]. There are a lot of protocols have been devised in QKD research such as BB84, Ekert 1991 (E91) [25], Bennett 1992 (B92) [26], Bennett-Brassard-Mermin 1992 (BBM92) [27], six-state [28], three-state [29] and Scarani-Acín-Ribordy-Gisin 2004 (SARG04) [30] protocols. The B92, six-state, three-state and SARG04 protocols are variations of BB84 protocol based on prepare-and-measure strategy, whereas E91 and BBM92 protocols are variations of BB84 protocol based on quantum entanglement means.…”
Section: Quantum Key Distribution (Qkd)mentioning
confidence: 99%