schliessen

Filtern

 

Bibliotheken

Randomness determines practical security of BB84 quantum key distribution

Unconditional security of the BB84 quantum key distribution protocol has been proved by exploiting the fundamental laws of quantum mechanics, but the practical quantum key distribution system maybe hacked by considering the imperfect state preparation and measurement respectively. Until now, differe... Full description

Journal Title: Scientific Reports (Nature Publisher Group) Nov 2015, Vol.5, p.16200
Main Author: Li, Hong-Wei
Other Authors: Yin, Zhen-Qiang , Wang, Shuang , Qian, Yong-Jun , Chen, Wei , Guo, Guang-Can , Han, Zheng-Fu
Format: Electronic Article Electronic Article
Language: English
Subjects:
ID: E-ISSN: 20452322 ; DOI: 10.1038/srep16200
Zum Text:
SendSend as email Add to Book BagAdd to Book Bag
Staff View
recordid: proquest1899819469
title: Randomness determines practical security of BB84 quantum key distribution
format: Article
creator:
  • Li, Hong-Wei
  • Yin, Zhen-Qiang
  • Wang, Shuang
  • Qian, Yong-Jun
  • Chen, Wei
  • Guo, Guang-Can
  • Han, Zheng-Fu
subjects:
  • Quantum Theory
  • Imperfect State
ispartof: Scientific Reports (Nature Publisher Group), Nov 2015, Vol.5, p.16200
description: Unconditional security of the BB84 quantum key distribution protocol has been proved by exploiting the fundamental laws of quantum mechanics, but the practical quantum key distribution system maybe hacked by considering the imperfect state preparation and measurement respectively. Until now, different attacking schemes have been proposed by utilizing imperfect devices, but the general security analysis model against all of the practical attacking schemes has not been proposed. Here, we demonstrate that the general practical attacking schemes can be divided into the Trojan horse attack, strong randomness attack and weak randomness attack respectively. We prove security of BB84 protocol under randomness attacking models, and these results can be applied to guarantee the security of the practical quantum key distribution system.
language: eng
source:
identifier: E-ISSN: 20452322 ; DOI: 10.1038/srep16200
fulltext: fulltext_linktorsrc
issn:
  • 20452322
  • 2045-2322
url: Link


@attributes
ID1756589658
RANK0.07
NO1
SEARCH_ENGINEprimo_central_multiple_fe
SEARCH_ENGINE_TYPEPrimo Central Search Engine
LOCALfalse
PrimoNMBib
record
control
sourcerecordid1899819469
sourceidproquest
recordidTN_proquest1899819469
sourcesystemPC
pqid1899819469
display
typearticle
titleRandomness determines practical security of BB84 quantum key distribution
creatorLi, Hong-Wei ; Yin, Zhen-Qiang ; Wang, Shuang ; Qian, Yong-Jun ; Chen, Wei ; Guo, Guang-Can ; Han, Zheng-Fu
ispartofScientific Reports (Nature Publisher Group), Nov 2015, Vol.5, p.16200
identifierE-ISSN: 20452322 ; DOI: 10.1038/srep16200
subjectQuantum Theory ; Imperfect State
descriptionUnconditional security of the BB84 quantum key distribution protocol has been proved by exploiting the fundamental laws of quantum mechanics, but the practical quantum key distribution system maybe hacked by considering the imperfect state preparation and measurement respectively. Until now, different attacking schemes have been proposed by utilizing imperfect devices, but the general security analysis model against all of the practical attacking schemes has not been proposed. Here, we demonstrate that the general practical attacking schemes can be divided into the Trojan horse attack, strong randomness attack and weak randomness attack respectively. We prove security of BB84 protocol under randomness attacking models, and these results can be applied to guarantee the security of the practical quantum key distribution system.
languageeng
source
version5
oafree_for_read
lds50peer_reviewed
links
openurl$$Topenurl_article
openurlfulltext$$Topenurlfull_article
linktorsrc$$Uhttp://search.proquest.com/docview/1899819469/?pq-origsite=primo$$EView_record_in_ProQuest_(subscribers_only)
search
creatorcontrib
0Li, Hong-Wei
1Yin, Zhen-Qiang
2Wang, Shuang
3Qian, Yong-Jun
4Chen, Wei
5Guo, Guang-Can
6Han, Zheng-Fu
titleRandomness determines practical security of BB84 quantum key distribution
descriptionUnconditional security of the BB84 quantum key distribution protocol has been proved by exploiting the fundamental laws of quantum mechanics, but the practical quantum key distribution system maybe hacked by considering the imperfect state preparation and measurement respectively. Until now, different attacking schemes have been proposed by utilizing imperfect devices, but the general security analysis model against all of the practical attacking schemes has not been proposed. Here, we demonstrate that the general practical attacking schemes can be divided into the Trojan horse attack, strong randomness attack and weak randomness attack respectively. We prove security of BB84 protocol under randomness attacking models, and these results can be applied to guarantee the security of the practical quantum key distribution system.
subject
0Quantum Theory
1Imperfect State
general
0English
1Nature Publishing Group
210.1038/srep16200
3Medical Database
4ProQuest Science Journals
5Health & Medical Collection (Alumni edition)
6Medical Database (Alumni edition)
7Science Database (Alumni edition)
8Health & Medical Collection
9ProQuest Biology Journals
10Biological Science Database
11Publicly Available Content Database
12ProQuest Biological Science Collection
13ProQuest Central
14ProQuest Hospital Collection
15ProQuest Natural Science Collection
16Hospital Premium Collection (Alumni edition)
17ProQuest SciTech Collection
18ProQuest Health & Medical Complete
19ProQuest Medical Library
20Natural Science Collection
21ProQuest Central (new)
22ProQuest Central K-12
23ProQuest Central Korea
24SciTech Premium Collection
25Health Research Premium Collection
26Health Research Premium Collection (Alumni edition)
27ProQuest Central Essentials
28ProQuest One Academic
sourceidproquest
recordidproquest1899819469
issn
020452322
12045-2322
rsrctypearticle
creationdate2015
addtitleScientific Reports (Nature Publisher Group)
searchscope
01000084
11000273
21000283
31006761
41006762
51006765
61006772
71007067
81007108
91007856
101007945
111008886
121009127
131009240
1410000038
1510000039
1610000047
1710000050
1810000118
1910000119
2010000120
2110000155
2210000156
2310000157
2410000158
2510000164
2610000238
2710000253
2810000255
2910000256
3010000257
3110000258
3210000260
3310000268
3410000270
3510000271
3610000281
3710000302
3810000348
3910000360
40proquest
scope
01000084
11000273
21000283
31006761
41006762
51006765
61006772
71007067
81007108
91007856
101007945
111008886
121009127
131009240
1410000038
1510000039
1610000047
1710000050
1810000118
1910000119
2010000120
2110000155
2210000156
2310000157
2410000158
2510000164
2610000238
2710000253
2810000255
2910000256
3010000257
3110000258
3210000260
3310000268
3410000270
3510000271
3610000281
3710000302
3810000348
3910000360
40proquest
lsr43
01000084true
11000273true
21000283true
31006761true
41006762true
51006765true
61006772true
71007067true
81007108true
91007856true
101007945true
111008886true
121009127true
131009240true
1410000038true
1510000039true
1610000047true
1710000050true
1810000118true
1910000119true
2010000120true
2110000155true
2210000156true
2310000157true
2410000158true
2510000164true
2610000238true
2710000253true
2810000255true
2910000256true
3010000257true
3110000258true
3210000260true
3310000268true
3410000270true
3510000271true
3610000281true
3710000302true
3810000348true
3910000360true
startdate20151101
enddate20151101
citationpf 16200 vol 5
lsr30VSR-Enriched:[issue, pqid]
sort
titleRandomness determines practical security of BB84 quantum key distribution
authorLi, Hong-Wei ; Yin, Zhen-Qiang ; Wang, Shuang ; Qian, Yong-Jun ; Chen, Wei ; Guo, Guang-Can ; Han, Zheng-Fu
creationdate20151101
lso0120151101
facets
frbrgroupid128546951528597816
frbrtype5
newrecords20170522
languageeng
creationdate2015
topic
0Quantum Theory
1Imperfect State
collection
0Medical Database
1ProQuest Science Journals
2Health & Medical Collection (Alumni edition)
3Medical Database (Alumni edition)
4Science Database (Alumni edition)
5Health & Medical Collection
6ProQuest Biology Journals
7Biological Science Database
8Publicly Available Content Database
9ProQuest Biological Science Collection
10ProQuest Central
11ProQuest Hospital Collection
12ProQuest Natural Science Collection
13Hospital Premium Collection (Alumni edition)
14ProQuest SciTech Collection
15ProQuest Health & Medical Complete
16ProQuest Medical Library
17Natural Science Collection
18ProQuest Central (new)
19ProQuest Central K-12
20ProQuest Central Korea
21SciTech Premium Collection
22Health Research Premium Collection
23Health Research Premium Collection (Alumni edition)
24ProQuest Central Essentials
25ProQuest One Academic
prefilterarticles
rsrctypearticles
creatorcontrib
0Li, Hong-Wei
1Yin, Zhen-Qiang
2Wang, Shuang
3Qian, Yong-Jun
4Chen, Wei
5Guo, Guang-Can
6Han, Zheng-Fu
jtitleScientific Reports (Nature Publisher Group)
toplevelpeer_reviewed
delivery
delcategoryRemote Search Resource
fulltextfulltext_linktorsrc
addata
aulast
0Li
1Yin
2Wang
3Qian
4Chen
5Guo
6Han
aufirst
0Hong-wei
1Zhen-qiang
2Shuang
3Yong-jun
4Wei
5Guang-can
6Zheng-fu
au
0Li, Hong-Wei
1Yin, Zhen-Qiang
2Wang, Shuang
3Qian, Yong-Jun
4Chen, Wei
5Guo, Guang-Can
6Han, Zheng-Fu
atitleRandomness determines practical security of BB84 quantum key distribution
jtitleScientific Reports (Nature Publisher Group)
risdate20151101
volume5
spage16200
pages16200
eissn20452322
formatjournal
genrearticle
ristypeJOUR
abstractUnconditional security of the BB84 quantum key distribution protocol has been proved by exploiting the fundamental laws of quantum mechanics, but the practical quantum key distribution system maybe hacked by considering the imperfect state preparation and measurement respectively. Until now, different attacking schemes have been proposed by utilizing imperfect devices, but the general security analysis model against all of the practical attacking schemes has not been proposed. Here, we demonstrate that the general practical attacking schemes can be divided into the Trojan horse attack, strong randomness attack and weak randomness attack respectively. We prove security of BB84 protocol under randomness attacking models, and these results can be applied to guarantee the security of the practical quantum key distribution system.
copLondon
pubNature Publishing Group
doi10.1038/srep16200
urlhttp://search.proquest.com/docview/1899819469/
issue1
oafree_for_read
date2015-11-01