| Literature DB >> 28374854 |
Peng Xue1,2, Kunkun Wang1, Xiaoping Wang1.
Abstract
We present an efficient quantum key distribution protocol with a certain entangled state to solve a special cryptographic task. Also, we provide a proof of security of this protocol by generalizing the proof of modified of Lo-Chau scheme. Based on this two-user scheme, a quantum cryptography network protocol is proposed without any quantum memory.Entities:
Year: 2017 PMID: 28374854 PMCID: PMC5379677 DOI: 10.1038/srep45928
Source DB: PubMed Journal: Sci Rep ISSN: 2045-2322 Impact factor: 4.379
Example of the two-user QKD scheme.
| A result | 0 0 | 0 0 | 0 | 0 0 | 0 1 1 | 1 1 | 1 | 1 1 | 1 |
| B basis | + + | + + | × | × × | × + + | + + | × | × × | × |
| B bit value | 0 0 | 1 1 | 0 | 0 1 | 1 0 0 | 1 1 | 0 | 0 1 | 1 |
| C basis | + × | + × | + | × + | × + × | + × | + | × + | × |
| C bit value | 0 0/1 | 1 0/1 | 0/1 | 0 0/1 | 1 1 0/1 | 0 0/1 | 0/1 | 1 0/1 | 0 |
| Compatible? | y n | y n | n | y n | y y n | y n | n | y n | y |
| Sited key | 0 | 1 | 0 | 1 0 | 1 | 0 | 1 |
Here + and × represent the rectilinear and diagonal bases , respectively.
We choose the case by the way of example, in which the measurement results of Alice are “0”, and all of the three users choose the rectilinear basis to establish a common key.
| A result | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
| B basis | + | + | × | × | × | × | × | × | × | × |
| B bit value | 0 | 1 | 0 | 0 | 1 | 1 | 0 | 0 | 1 | 1 |
| C basis | + | + | + | + | + | + | × | × | × | × |
| C bit value | 0 | 1 | 0 | 1 | 0 | 1 | 0 | 1 | 0 | 1 |
| D basis | + | + | + | + | + | + | × | × | × | × |
| D bit value | 0 | 1 | 0 | 1 | 0 | 1 | 0 | 1 | 0 | 1 |
| Sited key | 0 | 1 |
Suppose Bob use the diagonal basis and the other two choose the same ones for an error analysis. If the error rates are not too large (less than e), the communication channel between Carol and David is proved secure. Since the cyclic symmetry of the GHZ state, it is evident that by the same way we can check the channel between any two of the users.