Measuring-basis-encrypted six-state quantum key distribution scheme

A six-state quantum key distribution scheme with measuring-basis encryption technique, which is based on the six-state protocol and the MBE protocol, is proposed. In this modified six-state quantum key distribution protocol, Alice and Bob use a control key to synchronize the use of their measuring-basis so that they always use the same measuring-basis. This modified six-state quantum key distribution protocol retains the advantage of higher security and at the same time has a higher efficiency.

[1]  W. Wootters,et al.  A single quantum cannot be cloned , 1982, Nature.

[2]  P. Oscar Boykin,et al.  A Proof of the Security of Quantum Key Distribution , 1999, Symposium on the Theory of Computing.

[3]  Hoi-Kwong Lo,et al.  A simple proof of the unconditional security of quantum key distribution , 1999, ArXiv.

[4]  G. Long,et al.  Controlled order rearrangement encryption for quantum key distribution , 2003, quant-ph/0308172.

[5]  Shor,et al.  Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.

[6]  Dominic Mayers,et al.  Unconditional security in quantum cryptography , 1998, JACM.

[7]  A Cabello Quantum key distribution in the Holevo limit. , 2000, Physical review letters.

[8]  P. Oscar Boykin,et al.  A Proof of the Security of Quantum Key Distribution , 1999, STOC '00.

[9]  Hoi-Kwong Lo,et al.  Efficient Quantum Key Distribution Scheme and a Proof of Its Unconditional Security , 2004, Journal of Cryptology.

[10]  Charles H. Bennett,et al.  Quantum cryptography using any two nonorthogonal states. , 1992, Physical review letters.

[11]  Jian-Wei Pan,et al.  Efficient multiparty quantum-secret-sharing schemes , 2004, quant-ph/0405179.

[12]  G. S. Vernam,et al.  Cipher Printing Telegraph Systems For Secret Wire and Radio Telegraphic Communications , 1926, Transactions of the American Institute of Electrical Engineers.

[13]  Hoi-Kwong Lo,et al.  Proof of unconditional security of six-state quantum key distribution scheme , 2001, Quantum Inf. Comput..

[14]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[15]  Won Young Hwang,et al.  Quantum cryptography without public announcement of bases , 1997 .