| Literature DB >> 33267101 |
Tom Vergoossen1, Robert Bedington1, James A Grieve1, Alexander Ling1,2.
Abstract
An application of quantum communications is the transmission of qubits to create shared symmetric encryption keys in a process called quantum key distribution (QKD). Contrary to public-private key encryption, symmetric encryption is considered safe from (quantum) computing attacks, i.e. it provides forward security and is thus attractive for secure communications. In this paper we argue that for free-space quantum communications, especially with satellites, if one assumes that man-in-the-middle attacks can be detected by classical channel monitoring techniques, simplified quantum communications protocols and hardware systems can be implemented that offer improved key rates. We term these protocols photon key distribution (PKD) to differentiate them from the standard QKD protocols. We identify three types of photon sources and calculate asymptotic secret key rates for PKD protocols and compare them to their QKD counterparts. PKD protocols use only one measurement basis which we show roughly doubles the key rates. Furthermore, with the relaxed security assumptions one can establish keys at very high losses, in contrast to QKD where at the same losses privacy amplification would make key generation impossible.Entities:
Keywords: PKD; access control; photon key distribution; quantum communication; quantum cryptography; quantum key distribution; satellite QKD; threat model
Year: 2019 PMID: 33267101 PMCID: PMC7514874 DOI: 10.3390/e21040387
Source DB: PubMed Journal: Entropy (Basel) ISSN: 1099-4300 Impact factor: 2.524
Quantum key distribution (QKD) and photon key distribution (PKD) methods modelled for different hardware implementations.
| Photon Source | QKD Protocol | PKD Encoding (Example) |
|---|---|---|
| Weak coherent pulse (WCP) | Decoy state BB84 | Pulse position modulation (PPM) |
| Spontaneous parametric down conversion (SPDC) pairs | BBM92 (entanglement-based BB84) | Heralded Left or Right-handed polarized photons |
| Ideal single photon source (SPS) | Single photon BB84 | Left or Right-handed polarized photons |
Figure 1Modelling results for schemes described in Table 1. Assumptions are discussed in Section 3. (a) Key generation rate for quantum key distribution (QKD) protocols: decoy state BB84, BBM92, and BB84 using an ideal single photon source (SPS); (b) Key generation rate for photon key distribution (PKD) schemes: pulse-position modulated (PPM) photon key distribution (PKD), PKD with a heralded photon source, and PKD using an ideal SPS; (c) Quantum bit error rate (QBER) for QKD protocols; (d) QBER for simplified PKD schemes.