Security of six-state quantum key distribution protocol with threshold detectors

The security of quantum key distribution (QKD) is established by a security proof, and the security proof puts some assumptions on the devices consisting of a QKD system. Among such assumptions, security proofs of the six-state protocol assume the use of photon number resolving (PNR) detector, and as a result the bit error rate threshold for secure key generation for the six-state protocol is higher than that for the BB84 protocol. Unfortunately, however, this type of detector is demanding in terms of technological level compared to the standard threshold detector, and removing the necessity of such a detector enhances the feasibility of the implementation of the six-state protocol. Here, we develop the security proof for the six-state protocol and show that we can use the threshold detector for the six-state protocol. Importantly, the bit error rate threshold for the key generation for the six-state protocol (12.611%) remains almost the same as the one (12.619%) that is derived from the existing security proofs assuming the use of PNR detectors. This clearly demonstrates feasibility of the six-state protocol with practical devices.

[1]  Peter Kulchyski and , 2015 .

[2]  Masato Koashi,et al.  Security of entanglement-based quantum key distribution with practical detectors , 2008 .

[3]  T. Tsurumaru Squash operator and symmetry , 2009, 0910.2326.

[4]  J-C Boileau,et al.  Unconditional security of a three state quantum key distribution protocol. , 2004, Physical review letters.

[5]  K. Stetson,et al.  Progress in optics , 1980, IEEE Journal of Quantum Electronics.

[6]  John Preskill,et al.  Security of quantum key distribution with imperfect devices , 2002, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..

[7]  Thierry Paul,et al.  Quantum computation and quantum information , 2007, Mathematical Structures in Computer Science.

[8]  K. Tamaki,et al.  Quantum circuit for the proof of the security of quantum key distribution without encryption of error syndrome and noisy processing , 2010, 1002.3199.

[9]  H. Bechmann-Pasquinucci,et al.  Quantum cryptography , 2001, quant-ph/0101098.

[10]  R. Renner Symmetry of large physical systems implies independence of subsystems , 2007 .

[11]  N. Lutkenhaus Security against individual attacks for realistic quantum key distribution , 1999, quant-ph/9910093.

[12]  M. Dušek,et al.  Chapter 5 - Quantum cryptography , 2006, quant-ph/0601207.

[13]  Kazuoki Azuma WEIGHTED SUMS OF CERTAIN DEPENDENT RANDOM VARIABLES , 1967 .

[14]  Charles H. Bennett,et al.  Quantum cryptography without Bell's theorem. , 1992, Physical review letters.

[15]  D. Bruß Optimal Eavesdropping in Quantum Cryptography with Six States , 1998, quant-ph/9805019.

[16]  Charles H. Bennett,et al.  Mixed-state entanglement and quantum error correction. , 1996, Physical review. A, Atomic, molecular, and optical physics.

[17]  Gilles Brassard,et al.  Quantum Cryptography , 2005, Encyclopedia of Cryptography and Security.

[18]  Hoi-Kwong Lo,et al.  Universal squash model for optical communications using linear optics and threshold detectors , 2011 .

[19]  Hoi-Kwong Lo,et al.  Proof of unconditional security of six-state quantum key distribution scheme , 2001, Quantum Inf. Comput..

[20]  H. Lo,et al.  Unconditionally secure key distillation from multiphotons , 2004, quant-ph/0412035.

[21]  M. Koashi Complementarity, distillable secret key, and distillable entanglement , 2007, 0704.3661.

[22]  Masato Koashi,et al.  Simple security proof of quantum key distribution based on complementarity , 2009 .

[23]  T. Moroder,et al.  Detector decoy quantum key distribution , 2008, 0811.0027.

[24]  GuoDong Kang,et al.  Asymmetric “4+2” protocol for quantum key distribution with finite resources , 2013, Quantum Information Processing.

[25]  Jun Zhang,et al.  Advances in InGaAs/InP single-photon detector systems for quantum communication , 2015, Light: Science & Applications.

[26]  K. Tamaki,et al.  Security proof for quantum-key-distribution systems with threshold detectors , 2008, 0803.4226.

[27]  Normand J. Beaudry,et al.  Squashing models for optical measurements in quantum communication. , 2008, Physical review letters.

[28]  David P. DiVincenzo,et al.  Quantum information and computation , 2000, Nature.

[29]  Norbert Lutkenhaus,et al.  Estimates for practical quantum cryptography , 1998 .