skip to main content

Practical quantum key distribution protocol without monitoring signal disturbance.(LETTER)(Report)(Letter to the editor)

Sasaki, Toshihiko ; Yamamoto, Yoshihisa ; Koashi, Masato

Nature, May 22, 2014, Vol.509(7501), p.475(5) [Periódico revisado por pares]

Texto completo disponível

Citações Citado por
  • Título:
    Practical quantum key distribution protocol without monitoring signal disturbance.(LETTER)(Report)(Letter to the editor)
  • Autor: Sasaki, Toshihiko ; Yamamoto, Yoshihisa ; Koashi, Masato
  • Assuntos: Cryptography – Research ; Quantum Mechanics – Research
  • É parte de: Nature, May 22, 2014, Vol.509(7501), p.475(5)
  • Descrição: Quantum cryptography (1-8) exploits the fundamental laws of quantum mechanics to provide a secure way to exchange private information. Such an exchange requires a common random bit sequence, called a key, to be shared secretly between the sender and the receiver. The basic idea behind quantum key distribution (QKD) has widely been understood as the property that any attempt to distinguish encoded quantum states causes a disturbance in the signal. As a result, implementation of a QKD protocol involves an estimation of the experimental parameters influenced by the eavesdropper's intervention, which is achieved by randomly sampling the signal. If the estimation of many parameters with high precision is required, the portion of the signal that is sacrificed increases, thus decreasing the efficiency of the protocol (9,10). Here we propose a QKD protocol based on an entirely different principle. The sender encodes a bit sequence onto non-orthogonal quantum states and the receiver randomly dictates how a single bit should be calculated from the sequence. The eavesdropper, who is unable to learn the whole of the sequence, cannot guess the bit value correctly. An achievable rate of secure key distribution is calculated by considering complementary choices between quantum measurements of two conjugate observables (11). We found that a practical implementation using a laser pulse train achieves a key rate comparable to a decoy-state QKD protocol (12-14), an often-used technique for lasers. It also has a better tolerance of bit errors and of finite-sized-key effects. We anticipate that this finding will give new insight into how the probabilistic nature of quantum mechanics can be related to secure communication, and will facilitate the simple and efficient use of conventional lasers for QKD.
  • Idioma: Inglês

Buscando em bases de dados remotas. Favor aguardar.