{"title":"Entanglement measurement-device-independent Quantum Key Distribution","authors":"M. Alshowkan, K. Elleithy","doi":"10.1109/LISAT.2017.8001976","DOIUrl":null,"url":null,"abstract":"We propose a measurement-device-independent Quantum Key Distribution (MDI-QKD) protocol using weak coherent states and entanglement from weak coherent pulses. To overcome the side channel attacks, the sender and the receiver use decoy states to verify the security of the quantum channel. Then, they use uncorrelated entangled pairs to establish a correlated entanglement between them. The protocol establishes entangled communication channel between the sender and the receiver without performing the quantum distillation protocol. The protocol provides protection against side channel attacks such as photon-number-splitting (PNS). During the communication process, each party chooses to prepare a decoy state or a signal state. Then, they send their signals to a third party who performs Bell state measurement and then announces the measurement result. Using the information from the third party, who also could be an attacker, the sender and the receiver analyze the communication channel for any abnormalities. After verifying the security of the communication channel, the sender and the receiver establish the entanglement together for sharing secret keys.","PeriodicalId":370931,"journal":{"name":"2017 IEEE Long Island Systems, Applications and Technology Conference (LISAT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 IEEE Long Island Systems, Applications and Technology Conference (LISAT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/LISAT.2017.8001976","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
We propose a measurement-device-independent Quantum Key Distribution (MDI-QKD) protocol using weak coherent states and entanglement from weak coherent pulses. To overcome the side channel attacks, the sender and the receiver use decoy states to verify the security of the quantum channel. Then, they use uncorrelated entangled pairs to establish a correlated entanglement between them. The protocol establishes entangled communication channel between the sender and the receiver without performing the quantum distillation protocol. The protocol provides protection against side channel attacks such as photon-number-splitting (PNS). During the communication process, each party chooses to prepare a decoy state or a signal state. Then, they send their signals to a third party who performs Bell state measurement and then announces the measurement result. Using the information from the third party, who also could be an attacker, the sender and the receiver analyze the communication channel for any abnormalities. After verifying the security of the communication channel, the sender and the receiver establish the entanglement together for sharing secret keys.