schliessen

Filtern

 

Bibliotheken

Asecurity proof of measurement device independent quantum key distribution: from the view of information theory

Although some ideal quantum key distribution protocols have been proved to be secure, there have been some demonstrations that practical quantum key distribution implementations were hacked due to some real-life imperfections. Among these attacks, detector side channel attacks may be the most seriou... Full description

Journal Title: Chinese Physics Letters 2014, Vol.31(7), p.070302 (4pp)
Main Author: Li, Fang-Yi
Other Authors: Yin, Zhen-Qiang , Li, Hong-Wei , Chen, Wei , Wang, Shuang , Wen, Hao , Zhao, Yi-Bo , Han, Zheng-Fu
Format: Electronic Article Electronic Article
Language: English
Subjects:
ID: ISSN: 0256-307X ; E-ISSN: 1741-3540 ; DOI: 10.1088/0256-307X/31/7/070302
Link: http://dx.doi.org/10.1088/0256-307X/31/7/070302
Zum Text:
SendSend as email Add to Book BagAdd to Book Bag
Staff View
recordid: iop10.1088/0256-307X/31/7/070302
title: Asecurity proof of measurement device independent quantum key distribution: from the view of information theory
format: Article
creator:
  • Li, Fang-Yi
  • Yin, Zhen-Qiang
  • Li, Hong-Wei
  • Chen, Wei
  • Wang, Shuang
  • Wen, Hao
  • Zhao, Yi-Bo
  • Han, Zheng-Fu
subjects:
  • Physics
ispartof: Chinese Physics Letters, 2014, Vol.31(7), p.070302 (4pp)
description: Although some ideal quantum key distribution protocols have been proved to be secure, there have been some demonstrations that practical quantum key distribution implementations were hacked due to some real-life imperfections. Among these attacks, detector side channel attacks may be the most serious. Recently, a measurement device independent quantum key distribution protocol [ Phys. Rev. Lett. 108 (2012) 130503 ] was proposed and all detector side channel attacks are removed in this scheme. Here a new security proof based on quantum information theory is given. The eavesdropper's information of the sifted key bits is bounded. Then with this bound, the final secure key bit rate can be obtained.
language: eng
source:
identifier: ISSN: 0256-307X ; E-ISSN: 1741-3540 ; DOI: 10.1088/0256-307X/31/7/070302
fulltext: no_fulltext
issn:
  • 0256-307X
  • 1741-3540
  • 0256307X
  • 17413540
url: Link


@attributes
ID289368281
RANK0.07
NO1
SEARCH_ENGINEprimo_central_multiple_fe
SEARCH_ENGINE_TYPEPrimo Central Search Engine
LOCALfalse
PrimoNMBib
record
control
sourcerecordid10.1088/0256-307X/31/7/070302
sourceidiop
recordidTN_iop10.1088/0256-307X/31/7/070302
sourcesystemPC
pqid1660036675
display
typearticle
titleAsecurity proof of measurement device independent quantum key distribution: from the view of information theory
creatorLi, Fang-Yi ; Yin, Zhen-Qiang ; Li, Hong-Wei ; Chen, Wei ; Wang, Shuang ; Wen, Hao ; Zhao, Yi-Bo ; Han, Zheng-Fu
ispartofChinese Physics Letters, 2014, Vol.31(7), p.070302 (4pp)
identifier
descriptionAlthough some ideal quantum key distribution protocols have been proved to be secure, there have been some demonstrations that practical quantum key distribution implementations were hacked due to some real-life imperfections. Among these attacks, detector side channel attacks may be the most serious. Recently, a measurement device independent quantum key distribution protocol [ Phys. Rev. Lett. 108 (2012) 130503 ] was proposed and all detector side channel attacks are removed in this scheme. Here a new security proof based on quantum information theory is given. The eavesdropper's information of the sifted key bits is bounded. Then with this bound, the final secure key bit rate can be obtained.
languageeng
source
subjectPhysics;
version3
lds50peer_reviewed
links
openurl$$Topenurl_article
backlink$$Uhttp://dx.doi.org/10.1088/0256-307X/31/7/070302$$EView_record_in_IOPscience
openurlfulltext$$Topenurlfull_article
search
creatorcontrib
0Li, Fang-Yi
1Yin, Zhen-Qiang
2Li, Hong-Wei
3Chen, Wei
4Wang, Shuang
5Wen, Hao
6Zhao, Yi-Bo
7Han, Zheng-Fu
titleA Security Proof of Measurement Device Independent Quantum Key Distribution: From the View of Information Theory
descriptionAlthough some ideal quantum key distribution protocols have been proved to be secure, there have been some demonstrations that practical quantum key distribution implementations were hacked due to some real-life imperfections. Among these attacks, detector side channel attacks may be the most serious. Recently, a measurement device independent quantum key distribution protocol [ Phys. Rev. Lett. 108 (2012) 130503 ] was proposed and all detector side channel attacks are removed in this scheme. Here a new security proof based on quantum information theory is given. The eavesdropper's information of the sifted key bits is bounded. Then with this bound, the final secure key bit rate can be obtained.
general
010.1088/0256-307X/31/7/070302
1English
2IOPscience (IOP Publishing)
3Chinese Physics Letters
sourceidiop
recordidiop10.1088/0256-307X/31/7/070302
issn
00256-307X
11741-3540
20256307X
317413540
rsrctypearticle
creationdate2014
recordtypearticle
addtitleChinese Physics Letters
searchscope
0iop_rs
1iop
scope
0iop_rs
1iop
lsr30VSR-Enriched:[pqid, subject]
sort
titleAsecurity proof of measurement device independent quantum key distribution: from the view of information theory
creationdate20140701
authorLi, Fang-Yi ; Yin, Zhen-Qiang ; Li, Hong-Wei ; Chen, Wei ; Wang, Shuang ; Wen, Hao ; Zhao, Yi-Bo ; Han, Zheng-Fu
facets
frbrgroupid7937236513883955906
frbrtype5
languageeng
creationdate2014
collectionIOPscience (Institute of Physics)
prefilterarticles
rsrctypearticles
creatorcontrib
0Li, Fang-Yi
1Yin, Zhen-Qiang
2Li, Hong-Wei
3Chen, Wei
4Wang, Shuang
5Wen, Hao
6Zhao, Yi-Bo
7Han, Zheng-Fu
jtitleChinese Physics Letters
toplevelpeer_reviewed
delivery
delcategoryRemote Search Resource
fulltextno_fulltext
addata
aulast
0Li
1Yin
2Chen
3Wang
4Wen
5Zhao
6Han
aufirst
0Fang-Yi
1Zhen-Qiang
2Hong-Wei
3Wei
4Shuang
5Hao
6Yi-Bo
7Zheng-Fu
au
0Li, Fang-Yi
1Yin, Zhen-Qiang
2Li, Hong-Wei
3Chen, Wei
4Wang, Shuang
5Wen, Hao
6Zhao, Yi-Bo
7Han, Zheng-Fu
atitleA Security Proof of Measurement Device Independent Quantum Key Distribution: From the View of Information Theory
jtitleChinese Physics Letters
risdate20140701
volume31
issue7
spage070302
pages4
issn0256-307X
eissn1741-3540
formatjournal
genrearticle
ristypeJOUR
abstractAlthough some ideal quantum key distribution protocols have been proved to be secure, there have been some demonstrations that practical quantum key distribution implementations were hacked due to some real-life imperfections. Among these attacks, detector side channel attacks may be the most serious. Recently, a measurement device independent quantum key distribution protocol [ Phys. Rev. Lett. 108 (2012) 130503 ] was proposed and all detector side channel attacks are removed in this scheme. Here a new security proof based on quantum information theory is given. The eavesdropper's information of the sifted key bits is bounded. Then with this bound, the final secure key bit rate can be obtained.
doi10.1088/0256-307X/31/7/070302
date2014-07-01