| Literature DB >> 27357865 |
Jian Li1,2, Na Li1,3, Lei-Lei Li1, Tao Wang1.
Abstract
A novel quantum key distribution protocol is presented, based on entanglement and dense coding and allowing asymptotically secure key distribution. Considering the storage time limit of quantum bits, a grouping quantum key distribution protocol is proposed, which overcomes the vulnerability of first protocol and improves the maneuverability. Moreover, a security analysis is given and a simple type of eavesdropper's attack would introduce at least an error rate of 46.875%. Compared with the "Ping-pong" protocol involving two steps, the proposed protocol does not need to store the qubit and only involves one step.Entities:
Year: 2016 PMID: 27357865 PMCID: PMC4928064 DOI: 10.1038/srep28767
Source DB: PubMed Journal: Sci Rep ISSN: 2045-2322 Impact factor: 4.379
The example of EQKD.
| Number of classical bits | 0 | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 |
|---|---|---|---|---|---|---|---|---|---|---|
| Classical bits that Alice prepares | 1 | 1 | 0 | 0 | 0 | 1 | 1 | 0 | 1 | 0 |
| EPR that Alice prepares | ||||||||||
| Measurement results that Bob makes | ||||||||||
| Detection particles | ||||||||||
| Raw key that Bob obtains | 1 | 0 | 0 | 0 | 1 | 0 | ||||
| Correction and privacy amplification | 1 | 0 | 0 | 1 | ||||||
| Finial key | 1001 | |||||||||
The Example of the process that every group is transferred to Bob.
| Number of every group classical bits | 1 | 2 | 3 | 4 |
| Classical bits that Alice prepares | 1 | 0 | 1 | 1 |
| EPR that Alice prepares | ||||
| Measurement results that Bob makes | ||||
| Every group raw key | 1 | 0 | 1 | 1 |
The example of intercept and resend attack(a).
| Number of classical bits | 1 | 2 | 3 | 4 | 1 | 2 | 3 | 4 |
| Alice’s random bit | 1 | 0 | 1 | 1 | 0 | 0 | 1 | 0 |
| Alice sending Bell states | ||||||||
| Eve random measuring basis | Bell(13) | Bell(24) | Bell(13) | Bell(24) | Bell(13) | Bell(24) | Bell(13) | Bell(24) |
| Eve selects right or wrong location | right | wrong | ||||||
| Bell states Eve measures and sends | ||||||||
| Bob random measuring basis | Bell(13) | Bell(24) | Bell(13) | Bell(24) | Bell(12) | Bell(12) | Bel(34) | Bel(34) |
| Bell states Bob measures | ||||||||
| Public discussion of location | right | right | ||||||
| Public discussion of states | right | wrong | ||||||
| Share secret key | 1 | 0 | 1 | 1 | — | — | — | — |
| Errors in key | √ | √ | √ | √ | × | × | × | × |
The example of intercept and resend attack(b).
| Number of classical bits | 1 | 2 | 3 | 4 | 1 | 2 | 3 | 4 |
| Alice’s random bit | 0 | 0 | 1 | 0 | 0 | 0 | 1 | 0 |
| Alice sending Bell states | ||||||||
| Eve random measuring basis | Bell(13) | Bell(24) | Bell(13) | Bell(24) | Bell(13) | Bell(24) | Bell(13) | Bell(24) |
| Eve selects right or wrong location | wrong | wrong | ||||||
| Bell states Eve measures and sends | ||||||||
| Bob random measuring basis | Bell(12) | Bell(12) | Bell(34) | Bell(34) | Bell(12) | Bell(12) | Bel(34) | Bel(34) |
| Bell states Bob measures | ||||||||
| Public discussion of location | right | right | ||||||
| Public discussion of states | right/wrong | right | ||||||
| Share secret key | — | — | — | — | 0 | 0 | 1 | 0 |
| Errors in key | × | × | × | × | √ | √ | √ | √ |