Security of two quantum cryptography protocols using the same four qubit states
Journal Article
·
· Physical Review. A
- Group of Applied Physics, University of Geneva, 20, rue de l'Ecole-de-Medecine, 1211 Geneva 4 (Switzerland)
The first quantum cryptography protocol, proposed by Bennett and Brassard in 1984 (BB84), has been widely studied in recent years. This protocol uses four states (more precisely, two complementary bases) for the encoding of the classical bit. Recently, it has been noticed that by using the same four states, but a different encoding of information, one can define a protocol which is more robust in practical implementations, specifically when attenuated laser pulses are used instead of single-photon sources [V. Scarani et al., Phys. Rev. Lett. 92, 057901 (2004), referred to as the SARG04 protocol]. We present a detailed study of SARG04 in two different regimes. In the first part, we consider an implementation with a single-photon source: we derive bounds on the error rate Q for security against all possible attacks by the eavesdropper. The lower and the upper bound obtained for SARG04 (Q < or approx. 10.95% and Q > or approx. 14.9%, respectively) are close to those obtained for BB84 (Q < or approx. 12.4% and Q > or approx. 14.6%, respectively). In the second part, we consider a realistic source consisting of an attenuated laser and improve on previous analysis by allowing Alice to optimize the mean number of photons as a function of the distance. The SARG04 protocol is found to perform better than BB84, both in secret-key rate and in maximal achievable distance, for a wide class of Eve's attacks.
- OSTI ID:
- 20718487
- Journal Information:
- Physical Review. A, Journal Name: Physical Review. A Journal Issue: 3 Vol. 72; ISSN 1050-2947; ISSN PLRAAN
- Country of Publication:
- United States
- Language:
- English
Similar Records
Photon-number-splitting versus cloning attacks in practical implementations of the Bennett-Brassard 1984 protocol for quantum cryptography
Performance of two quantum-key-distribution protocols
Limitation of decoy-state Scarani-Acin-Ribordy-Gisin quantum-key-distribution protocols with a heralded single-photon source
Journal Article
·
Thu Mar 31 23:00:00 EST 2005
· Physical Review. A
·
OSTI ID:20653273
Performance of two quantum-key-distribution protocols
Journal Article
·
Sat Jan 14 23:00:00 EST 2006
· Physical Review. A
·
OSTI ID:20786682
Limitation of decoy-state Scarani-Acin-Ribordy-Gisin quantum-key-distribution protocols with a heralded single-photon source
Journal Article
·
Mon Oct 15 00:00:00 EDT 2007
· Physical Review. A
·
OSTI ID:21020848