Provably Secure Three-Party Authenticated Quantum Key Distribution Protocols
IEEE Transactions on Dependable and Secure Computing
Key Rate Available from Mismatched Measurements in the BB84 Protocol and the Uncertainty Principle
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Composing Quantum Protocols in a Classical Environment
TCC '09 Proceedings of the 6th Theory of Cryptography Conference on Theory of Cryptography
General paradigm for distilling classical key from quantum states
IEEE Transactions on Information Theory
Optimal axis compensation in quantum key distribution protocols over unital channels
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 3
Verification of Quantum Protocols with a Probabilistic Model-Checker
Electronic Notes in Theoretical Computer Science (ENTCS)
Quantum Information Processing
Information reconciliation for quantum key distribution
Quantum Information & Computation
Quantum Information & Computation
Security of quantum key distribution with imperfect devices
Quantum Information & Computation
Some attacks on quantum-based cryptographic protocols
Quantum Information & Computation
Information vs. disturbance in dimension D
Quantum Information & Computation
Getting something out of nothing
Quantum Information & Computation
A simple participant attack on the brádler-dušek protocol
Quantum Information & Computation
Security of quantum key distribution using weak coherent states with nonrandom phases
Quantum Information & Computation
Security proof of quantum key distribution with detection efficiency mismatch
Quantum Information & Computation
The universal composable security of quantum key distribution
TCC'05 Proceedings of the Second international conference on Theory of Cryptography
Universally composable privacy amplification against quantum adversaries
TCC'05 Proceedings of the Second international conference on Theory of Cryptography
Probabilistic quantum key distribution
Quantum Information & Computation
Quantum Information & Computation
Hi-index | 754.90 |
Shor and Preskill (see Phys. Rev. Lett., vol.85, p.441, 2000) have provided a simple proof of security of the standard quantum key distribution scheme by Bennett and Brassard (1984) by demonstrating a connection between key distribution and entanglement purification protocols (EPPs) with one-way communications. Here, we provide proofs of security of standard quantum key distribution schemes, Bennett and Brassard and the six-state scheme, against the most general attack, by using the techniques of two-way entanglement purification. We demonstrate clearly the advantage of classical post-processing with two-way classical communications over classical post-processing with only one-way classical communications in quantum key distribution (QKD). This is done by the explicit construction of a new protocol for (the error correction/detection and privacy amplification of) Bennett and Brassard that can tolerate a bit error rate of up to 18.9%, which is higher than what any Bennett and Brassard scheme with only one-way classical communications can possibly tolerate. Moreover, we demonstrate the advantage of the six-state scheme over Bennett and Brassard by showing that the six-state scheme can strictly tolerate a higher bit error rate than Bennett and Brassard. In particular, our six-state protocol can tolerate a bit error rate of 26.4%, which is higher than the upper bound of 25% bit error rate for any secure Bennett and Brassard protocol. Consequently, our protocols may allow higher key generation rate and remain secure over longer distances than previous protocols. Our investigation suggests that two-way entanglement purification is a useful tool in the study of advantage distillation, error correction, and privacy amplification protocols.