Security of quantum-key-distribution protocol by using the post-selection technique

Abstract:

The post-selection technique was proposed by Christandl, König, and Renner [Phys. Rev. Lett. 102, 020504 (2009)] to simplify the security of quantum-key-distribution schemes. This work applies this technique to derive the security bounds for the six-state Scarani-Acin-Rigbordy-Gisin 2004 quantum key distribution protocol. This protocol can extract secure keys from a source emitting multi-photons due to its robustness from photon number splitting attacks, making it a good candidate for practical implementations. We also compare the security bounds for this protocol under collective attacks to the security bounds obtained after applying the post-selection technique when using finite resources. Our results demonstrate that the bounds for optimal attack are close to the bound for collective attack for many signals. Notably, the six-state SARG04 protocol proves to be more robust to the PNS attacks when compared to the original four-state SARG04 protocol. This demonstrates the power of the post-selection technique in deriving the security bounds for the six-state protocol when finite resources are used.
Overall Rating

0

5 Star
(0)
4 Star
(0)
3 Star
(0)
2 Star
(0)
1 Star
(0)
APA

Comfort, S (2024). Security of quantum-key-distribution protocol by using the post-selection technique. Afribary. Retrieved from https://tracking.afribary.com/works/security-of-quantum-key-distribution-protocol-by-using-the-post-selection-technique

MLA 8th

Comfort, Sekga "Security of quantum-key-distribution protocol by using the post-selection technique" Afribary. Afribary, 30 Mar. 2024, https://tracking.afribary.com/works/security-of-quantum-key-distribution-protocol-by-using-the-post-selection-technique. Accessed 12 Nov. 2024.

MLA7

Comfort, Sekga . "Security of quantum-key-distribution protocol by using the post-selection technique". Afribary, Afribary, 30 Mar. 2024. Web. 12 Nov. 2024. < https://tracking.afribary.com/works/security-of-quantum-key-distribution-protocol-by-using-the-post-selection-technique >.

Chicago

Comfort, Sekga . "Security of quantum-key-distribution protocol by using the post-selection technique" Afribary (2024). Accessed November 12, 2024. https://tracking.afribary.com/works/security-of-quantum-key-distribution-protocol-by-using-the-post-selection-technique

Document Details
Sekga, Comfort Field: Computer Science Type: Paper 7 PAGES (7112 WORDS) (pdf)