pith. the verified trust layer for science. sign in

arxiv: 1507.08930 · v1 · pith:PLOR2KVEnew · submitted 2015-07-31 · 🪐 quant-ph

Practical security analysis of two-way quantum key distribution protocols based on non-orthogonal states

classification 🪐 quant-ph
keywords securitytwqkdprotocolquantumanalysisbasesdeterministicdistribution
0
0 comments X p. Extension
Add this Pith Number to your LaTeX paper What is a Pith Number?
\usepackage{pith}
\pithnumber{PLOR2KVE}

Prints a linked pith:PLOR2KVE badge after your title and writes the identifier into PDF metadata. Compiles on arXiv with no extra files. Learn more

read the original abstract

Within the broad research scenario of quantum secure communication, Two-Way Quantum Key Distribution (TWQKD) is a relatively new proposal for sharing secret keys that is not fully explored yet. We analyse the security of TWQKD schemes that use qubits prepared in non-orthogonal states to transmit the key. Investigating protocols that employ an arbitrary number of bases for the channel preparation, we show, in particular, that the security of the LM05 protocol can not be improved by the use of more than two preparation bases. We also provide a new proof of unconditional security for a deterministic TWQKD protocol recently proposed [Phys. Rev. A 88, 062302 (2013)]. In addition, we introduce a novel deterministic protocol named TWQKD six-state and compute an analytical lower bound (which can be tightened) for the maximum amount of information that an eavesdropper could extract in this case. An interesting advantage of our approach to the security analysis of TWQKD is the great simplicity and transparency of the derivations.

This paper has not been read by Pith yet.

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.