{"title":"纠缠测量-与设备无关的量子密钥分配","authors":"M. Alshowkan, K. Elleithy","doi":"10.1109/LISAT.2017.8001976","DOIUrl":null,"url":null,"abstract":"We propose a measurement-device-independent Quantum Key Distribution (MDI-QKD) protocol using weak coherent states and entanglement from weak coherent pulses. To overcome the side channel attacks, the sender and the receiver use decoy states to verify the security of the quantum channel. Then, they use uncorrelated entangled pairs to establish a correlated entanglement between them. The protocol establishes entangled communication channel between the sender and the receiver without performing the quantum distillation protocol. The protocol provides protection against side channel attacks such as photon-number-splitting (PNS). During the communication process, each party chooses to prepare a decoy state or a signal state. Then, they send their signals to a third party who performs Bell state measurement and then announces the measurement result. Using the information from the third party, who also could be an attacker, the sender and the receiver analyze the communication channel for any abnormalities. After verifying the security of the communication channel, the sender and the receiver establish the entanglement together for sharing secret keys.","PeriodicalId":370931,"journal":{"name":"2017 IEEE Long Island Systems, Applications and Technology Conference (LISAT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Entanglement measurement-device-independent Quantum Key Distribution\",\"authors\":\"M. Alshowkan, K. Elleithy\",\"doi\":\"10.1109/LISAT.2017.8001976\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We propose a measurement-device-independent Quantum Key Distribution (MDI-QKD) protocol using weak coherent states and entanglement from weak coherent pulses. To overcome the side channel attacks, the sender and the receiver use decoy states to verify the security of the quantum channel. Then, they use uncorrelated entangled pairs to establish a correlated entanglement between them. The protocol establishes entangled communication channel between the sender and the receiver without performing the quantum distillation protocol. The protocol provides protection against side channel attacks such as photon-number-splitting (PNS). During the communication process, each party chooses to prepare a decoy state or a signal state. Then, they send their signals to a third party who performs Bell state measurement and then announces the measurement result. Using the information from the third party, who also could be an attacker, the sender and the receiver analyze the communication channel for any abnormalities. After verifying the security of the communication channel, the sender and the receiver establish the entanglement together for sharing secret keys.\",\"PeriodicalId\":370931,\"journal\":{\"name\":\"2017 IEEE Long Island Systems, Applications and Technology Conference (LISAT)\",\"volume\":\"19 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-05-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 IEEE Long Island Systems, Applications and Technology Conference (LISAT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/LISAT.2017.8001976\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 IEEE Long Island Systems, Applications and Technology Conference (LISAT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/LISAT.2017.8001976","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Entanglement measurement-device-independent Quantum Key Distribution
We propose a measurement-device-independent Quantum Key Distribution (MDI-QKD) protocol using weak coherent states and entanglement from weak coherent pulses. To overcome the side channel attacks, the sender and the receiver use decoy states to verify the security of the quantum channel. Then, they use uncorrelated entangled pairs to establish a correlated entanglement between them. The protocol establishes entangled communication channel between the sender and the receiver without performing the quantum distillation protocol. The protocol provides protection against side channel attacks such as photon-number-splitting (PNS). During the communication process, each party chooses to prepare a decoy state or a signal state. Then, they send their signals to a third party who performs Bell state measurement and then announces the measurement result. Using the information from the third party, who also could be an attacker, the sender and the receiver analyze the communication channel for any abnormalities. After verifying the security of the communication channel, the sender and the receiver establish the entanglement together for sharing secret keys.