pith. machine review for the scientific record. sign in

arxiv: 1111.0109 · v1 · submitted 2011-11-01 · 🪐 quant-ph

Recognition: unknown

Unconditional security proof of a deterministic quantum key distribution with a two-way quantum channel

Authors on Pith no claims yet
classification 🪐 quant-ph
keywords channelquantumsecuritydqkdqubittwo-wayalicedeterministic
0
0 comments X
read the original abstract

In a deterministic quantum key distribution (DQKD) protocol with a two-way quantum channel, Bob sends a qubit to Alice who then encodes a key bit onto the qubit and sends it back to Bob. After measuring the returned qubit, Bob can obtain Alice's key bit immediately, without basis reconciliation. Since an eavesdropper may attack the qubits traveling on either the Bob-Alice channel or the Alice-Bob channel, the security analysis of DQKD with a two-way quantum channel is complicated and its unconditional security has been controversial. This paper presents a security proof of a single-photon four-state DQKD against general attacks.

This paper has not been read by Pith yet.

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.