skip to main content
OSTI.GOV title logo U.S. Department of Energy
Office of Scientific and Technical Information

Title: On quantum key distribution using ququarts

Abstract

A comparative analysis of quantum key distribution protocols using qubits and ququarts as information carriers is presented. Several schemes of incoherent attacks that can be used by an eavesdropper to obtain secret information are considered. The errors induced by the eavesdropper are analyzed for several key distribution protocols.

Authors:
;  [1]
  1. Moscow State University (Russian Federation)
Publication Date:
OSTI Identifier:
21072480
Resource Type:
Journal Article
Resource Relation:
Journal Name: Journal of Experimental and Theoretical Physics; Journal Volume: 104; Journal Issue: 5; Other Information: DOI: 10.1134/S106377610705007X; Copyright (c) 2007 Nauka/Interperiodica; Article Copyright (c) 2007 Pleiades Publishing, Inc; Country of input: International Atomic Energy Agency (IAEA)
Country of Publication:
United States
Language:
English
Subject:
71 CLASSICAL AND QUANTUM MECHANICS, GENERAL PHYSICS; INFORMATION THEORY; QUANTUM MECHANICS; QUBITS

Citation Formats

Kulik, S. P., E-mail: Sergei.Kulik@gmail.com, and Shurupov, A. P. On quantum key distribution using ququarts. United States: N. p., 2007. Web. doi:10.1134/S106377610705007X.
Kulik, S. P., E-mail: Sergei.Kulik@gmail.com, & Shurupov, A. P. On quantum key distribution using ququarts. United States. doi:10.1134/S106377610705007X.
Kulik, S. P., E-mail: Sergei.Kulik@gmail.com, and Shurupov, A. P. Tue . "On quantum key distribution using ququarts". United States. doi:10.1134/S106377610705007X.
@article{osti_21072480,
title = {On quantum key distribution using ququarts},
author = {Kulik, S. P., E-mail: Sergei.Kulik@gmail.com and Shurupov, A. P.},
abstractNote = {A comparative analysis of quantum key distribution protocols using qubits and ququarts as information carriers is presented. Several schemes of incoherent attacks that can be used by an eavesdropper to obtain secret information are considered. The errors induced by the eavesdropper are analyzed for several key distribution protocols.},
doi = {10.1134/S106377610705007X},
journal = {Journal of Experimental and Theoretical Physics},
number = 5,
volume = 104,
place = {United States},
year = {Tue May 15 00:00:00 EDT 2007},
month = {Tue May 15 00:00:00 EDT 2007}
}
  • We study the behavior of decoy-state quantum key distribution systems using a conditionally prepared down-conversion source, analyzing such a source running in a mode of operation with either a thermal photon number distribution or a Poisson photon number distribution. By comparing both modes of operations to the three-intensity proposal of Wang et al., to the one-intensity proposal of Adachi et al., and to the currently demonstrated faint-laser pulse system, we demonstrate that a down-conversion source in a Poissonian mode of operation can largely enhance the performance of decoy-state quantum key distribution systems. This makes the down-conversion-based decoy-state system an interestingmore » alternative to current technological implementations based on faint-laser pulses.« less
  • The differential-phase-shift quantum key distribution (DPS-QKD) is a recently proposed QKD scheme in which a pulse train is transmitted through a quantum channel. This paper extends the ideal of the DPS-QKD to entanglement-based systems. Two schemes are presented. In one, an entanglement source sends pulse trains of signal and idler to two parties (Alice and Bob), respectively, who phase-modulate the incoming pulses and receive them after one-bit delay interferometers. In the other, two entanglement sources are prepared, one between Alice and a repeating node (Charlie) and one between Charlie and Bob, which send signal and idler pulse trains to Alicemore » and Bob and Charlie, respectively. These schemes offer a longer distance between Alice and Bob than the conventional DPS-QKD.« less
  • A quantum circuit is constructed for optimal eavesdropping on quantum key distribution proto- cols using phase-time coding, and its physical implementation based on linear and nonlinear fiber-optic components is proposed.
  • Differential-phase-shift quantum key distribution based on two nonorthogonal states is described. A weak coherent pulse train is sent from Alice to Bob, in which the phase of each pulse is randomly modulated by {l_brace}0,{pi}{r_brace}. Bob measures the differential phase by a one-bit delay circuit. The system has a simple configuration without the need for an interferometer and a bright reference pulse in Alice's site, unlike the conventional QKD system based on two nonorthogonal states, and has an advantage of improved communication efficiency. The principle of the operation is successfully demonstrated in experiments.
  • We propose a high security quantum key distribution (QKD) scheme utilizing one mode of spontaneous parametric downconversion gated by a photon number resolving detector. This photon number measurement is possible by using single-photon detectors operating at room temperature and optical fibers. By post selection, the multiphoton probability in this scheme can be reduced to lower than that of a scheme using an attenuated coherent light resulting in improvement of security. Furthermore, if distillation protocol (error correction and privacy amplification) is performed, the gain will be increased. Hence a QKD system with higher security and bit rate than the laser-based QKDmore » system can be attained using present available technologies.« less