| Literature DB >> 24816899 |
Yun-Guang Han1, Zhen-Qiang Yin1, Hong-Wei Li2, Wei Chen2, Shuang Wang2, Guang-Can Guo2, Zheng-Fu Han2.
Abstract
The "Ping-Pong" (PP) protocol is a two-way quantum key protocol based on entanglement. In this protocol, Bob prepares one maximally entangled pair of qubits, and sends one qubit to Alice. Then, Alice performs some necessary operations on this qubit and sends it back to Bob. Although this protocol was proposed in 2002, its security in the noisy and lossy channel has not been proven. In this report, we add a simple and experimentally feasible modification to the original PP protocol, and prove the security of this modified PP protocol against collective attacks when the noisy and lossy channel is taken into account. Simulation results show that our protocol is practical.Entities:
Year: 2014 PMID: 24816899 PMCID: PMC4017212 DOI: 10.1038/srep04936
Source DB: PubMed Journal: Sci Rep ISSN: 2045-2322 Impact factor: 4.379
Figure 1Coding system of modified PP protocol.
There are two modes: message mode(solid line) and control mode(dash line) in the operations of Alice and Bob. In message mode, if Alice wants to encode bit 0, she will randomly perform I0 or I1. If Alice wants to encode bit 1, she will randomly perform Y0 or Y1. The operations are defined as I0{|v〉, |0〉, |1〉} = {|v〉, |0〉, |1〉}, I1{|v〉, |0〉, |1〉} = {|v〉, −|0〉, −|1〉}, Y0{|v〉, |0〉, |1〉} = {|v〉, |0〉, −|1〉}, Y1{|v〉, |0〉, |1〉} = {|v〉, −|0〉, |1〉}. BSM is for Bell-states measurement, and Z represents the measurement defined by projectors {|v〉〈v|, |0〉〈0|, |1〉〈1|}.
Figure 2Simulation: Secure-key rate Lg(R) vs channel distance L (km) from Bob to Alice.
We set η = 0.1, d = 10−5 per pulse. The detector error rate is 1%.