Corpus ID: 229679779

Security proof of qudit-system-based quantum cryptography against entanglement-measurement attack using decoy photons

@inproceedings{Ji2020SecurityPO,
  title={Security proof of qudit-system-based quantum cryptography against entanglement-measurement attack using decoy photons},
  author={Zhaoxu Ji and Peiru Fan and Huanguo Zhang},
  year={2020}
}
By using decoy photon technology, quantum cryptography can resist many famous attacks, such as intercept-resend attack, entanglement-resend attack and entanglement-measurement attack. In d-level systems, two groups of non orthogonal bases composed of a group of d-level single particles and the single particles after quantum Fourier transform are widely used as decoy photons. However, the security proof of quantum cryptography protocols against entanglementmeasurement attack using decoy photon… Expand
Entanglement swapping of Bell states and multi-particle Greenberger-Horne-Zeilinger states
Entanglement swapping can generate entanglement between particles that never interacted, which is essential in quantum information processing. In this paper, we start from considering theExpand
Two-party quantum private comparison protocol using eight-qubit entangled state
Quantum private comparison (QPC) aims to solve “Tiercé problem” based on the laws of quantum mechanics, where the “Tiercé problem” is to determine whether the secret data of two participants areExpand

References

SHOWING 1-10 OF 19 REFERENCES
Several two-party protocols for quantum private comparison using entanglement and dense coding
TLDR
This paper proposes several QPC protocols using Bell states, genuinely entangled five-qubit states, four-qu bit cluster states and χ -type states, which use dense coding technology to make the qubit efficiency of the protocol reach 100%, which is much higher than that of most existing protocols. Expand
Survey on quantum information security
TLDR
This paper reviews the research and development of several important and well-studied branches of quantum cryptography in terms of theory and experiment, including quantum key distribution, quantum secret sharing, quantum secure direct communication, quantum signature, and quantum private query. Expand
Security of quantum key distribution with entangled photons against individual attacks
We investigate the security of quantum key distribution with entangled photons, focusing on the two-photon variation of the Bennett-Brassard 1984 (BB84) protocol proposed in 1992 by Bennett, Brasard,Expand
The security of practical quantum key distribution
Quantum key distribution (QKD) is the first quantum information task to reach the level of mature technology, already fit for commercialization. It aims at the creation of a secret key betweenExpand
Two-party quantum private comparison protocol with maximally entangled seven-qubit state
Quantum private comparison (QPC), whose security is based on some laws of quantum mechanics (e.g. quantum noncloning theorem and Heisenbergs uncertainty principle), allows [Formula: see text] partiesExpand
Quantum Cryptography
TLDR
A remarkable surge of interest in the international scientific and industrial community has propelled quantum cryptography into mainstream computer science and physics and it is becoming increasingly practical at a fast pace. Expand
Security of two-way quantum key distribution
Quantum key distribution protocols typically make use of a one-way quantum channel to distribute a shared secret string to two distant users. However, protocols exploiting a two-way quantum channelExpand
Security of continuous-variable quantum key distribution against general attacks.
TLDR
This work proves the security of Gaussian continuous-variable quantum key distribution with coherent states against arbitrary attacks in the finite-size regime using a novel proof approach that exploits phase-space symmetries of the protocols as well as the postselection technique introduced by Christandl, Koenig, and Renner. Expand
Quantum Private Comparison Protocols With a Number of Multi-Particle Entangled States
TLDR
This paper presents two QPC protocols, where a semi-honest third party who assists two participants in implementing the protocols is assumed, and shows that the security of the protocols towards both outsider and insider attacks can be guaranteed. Expand
An efficient protocol for the private comparison of equal information based on the triplet entangled state and single-particle measurement
TLDR
An efficient protocol for comparing the equal information with the help of a third party (TP) that utilizes the triplet entangled states and the simple single-particle measurement is proposed. Expand
...
1
2
...