纠缠测量-与设备无关的量子密钥分配

M. Alshowkan, K. Elleithy
{"title":"纠缠测量-与设备无关的量子密钥分配","authors":"M. Alshowkan, K. Elleithy","doi":"10.1109/LISAT.2017.8001976","DOIUrl":null,"url":null,"abstract":"We propose a measurement-device-independent Quantum Key Distribution (MDI-QKD) protocol using weak coherent states and entanglement from weak coherent pulses. To overcome the side channel attacks, the sender and the receiver use decoy states to verify the security of the quantum channel. Then, they use uncorrelated entangled pairs to establish a correlated entanglement between them. The protocol establishes entangled communication channel between the sender and the receiver without performing the quantum distillation protocol. The protocol provides protection against side channel attacks such as photon-number-splitting (PNS). During the communication process, each party chooses to prepare a decoy state or a signal state. Then, they send their signals to a third party who performs Bell state measurement and then announces the measurement result. Using the information from the third party, who also could be an attacker, the sender and the receiver analyze the communication channel for any abnormalities. After verifying the security of the communication channel, the sender and the receiver establish the entanglement together for sharing secret keys.","PeriodicalId":370931,"journal":{"name":"2017 IEEE Long Island Systems, Applications and Technology Conference (LISAT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Entanglement measurement-device-independent Quantum Key Distribution\",\"authors\":\"M. Alshowkan, K. Elleithy\",\"doi\":\"10.1109/LISAT.2017.8001976\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We propose a measurement-device-independent Quantum Key Distribution (MDI-QKD) protocol using weak coherent states and entanglement from weak coherent pulses. To overcome the side channel attacks, the sender and the receiver use decoy states to verify the security of the quantum channel. Then, they use uncorrelated entangled pairs to establish a correlated entanglement between them. The protocol establishes entangled communication channel between the sender and the receiver without performing the quantum distillation protocol. The protocol provides protection against side channel attacks such as photon-number-splitting (PNS). During the communication process, each party chooses to prepare a decoy state or a signal state. Then, they send their signals to a third party who performs Bell state measurement and then announces the measurement result. Using the information from the third party, who also could be an attacker, the sender and the receiver analyze the communication channel for any abnormalities. After verifying the security of the communication channel, the sender and the receiver establish the entanglement together for sharing secret keys.\",\"PeriodicalId\":370931,\"journal\":{\"name\":\"2017 IEEE Long Island Systems, Applications and Technology Conference (LISAT)\",\"volume\":\"19 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-05-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 IEEE Long Island Systems, Applications and Technology Conference (LISAT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/LISAT.2017.8001976\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 IEEE Long Island Systems, Applications and Technology Conference (LISAT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/LISAT.2017.8001976","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

我们提出了一种利用弱相干态和弱相干脉冲纠缠的与测量设备无关的量子密钥分配(MDI-QKD)协议。为了克服侧信道攻击,发送方和接收方使用诱饵状态来验证量子信道的安全性。然后,他们使用不相关的纠缠对来建立它们之间的相关纠缠。该协议在发送方和接收方之间建立了纠缠通信信道,而不执行量子蒸馏协议。该协议提供了对侧信道攻击的保护,例如光子数字分裂(PNS)。在通信过程中,每一方选择准备一个诱饵状态或一个信号状态。然后,他们将信号发送给执行贝尔状态测量的第三方,然后宣布测量结果。发送方和接收方利用来自第三方(也可能是攻击者)的信息,分析通信通道是否存在异常。在验证通信信道的安全性后,发送方和接收方共同建立纠缠以共享密钥。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Entanglement measurement-device-independent Quantum Key Distribution
We propose a measurement-device-independent Quantum Key Distribution (MDI-QKD) protocol using weak coherent states and entanglement from weak coherent pulses. To overcome the side channel attacks, the sender and the receiver use decoy states to verify the security of the quantum channel. Then, they use uncorrelated entangled pairs to establish a correlated entanglement between them. The protocol establishes entangled communication channel between the sender and the receiver without performing the quantum distillation protocol. The protocol provides protection against side channel attacks such as photon-number-splitting (PNS). During the communication process, each party chooses to prepare a decoy state or a signal state. Then, they send their signals to a third party who performs Bell state measurement and then announces the measurement result. Using the information from the third party, who also could be an attacker, the sender and the receiver analyze the communication channel for any abnormalities. After verifying the security of the communication channel, the sender and the receiver establish the entanglement together for sharing secret keys.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信