Chinese Journal of Quantum Electronics, Volume. 40, Issue 3, 407(2023)

Research on the upper bound of collective attack in E91-QKD

JIA Wei1, ZHANG Qiangqiang1, BIAN Yuxiang1, and LI Wei2、*
Author Affiliations
  • 1NRGD Quantum Technology Co., Ltd., Nanjing 211006, China
  • 2College of Communication and Information Engineering, Nanjing University of Posts and Telecommunications,Nanjing 210003, China
  • show less
    References(22)

    [1] Ekert A K. Quantum cryptography based on Bell's theorem[J]. Physical Review Letters, 67, 661-663(1991).

    [2] Scarani V, Bechmann-Pasquinucci H, Cerf N J et al. The security of practical quantum key distribution[J]. Reviews of Modern Physics, 81, 1301-1350(2009).

    [3] Xu F H, Ma X F, Zhang Q et al. Secure quantum key distribution with realistic devices[J]. Reviews of Modern Physics, 92, 025002(2020).

    [4] Ye W, Zhong H, Liao Q et al. Improvement of self-referenced continuous-variable quantum key distribution with quantum photon catalysis[J]. Optics Express, 27, 17186-17198(2019).

    [5] Hu L Y, Al-amri M, Liao Z Y et al. Continuous-variable quantum key distribution with non-Gaussian operations[J]. Physical Review A, 102, 012608(2020).

    [6] Lo H K, Chau H F. Unconditional security of quantum key distribution over arbitrarily long distances[J]. Science, 283, 2050-2056(1999).

    [7] Fröhlich B, Lucamarini M, Dynes J F et al. Long-distance quantum key distribution secure against coherent attacks[J]. Optica, 4, 163-167(2017).

    [8] Biham E, Mor T. Security of quantum cryptography against collective attacks[J]. Physical Review Letters, 78, 2256-2259(1997).

    [9] Acín A, Brunner N, Gisin N et al. Device-independent security of quantum cryptography against collective attacks[J]. Physical Review Letters, 98, 230501(2007).

    [10] Biham M, Boyer G, Brassard J et al. Security of quantum key distribution against all collective attacks[J]. Algorithmica, 34, 372-388(2002).

    [11] Pironio S, Acín A, Brunner N et al. Device-independent quantum key distribution secure against collective attacks[J]. New Journal of Physics, 11, 045021(2009).

    [12] Li W, Wang L, Zhao S M. Phase matching quantum key distribution based on single-photon entanglement[J]. Scientific Reports, 9, 15466(2019).

    [13] Yin Z Q, Fung C H F, Ma X F et al. Measurement-device-independent quantum key distribution with uncharacterized qubit sources[J]. Physical Review A, 88, 062322(2013).

    [14] Fuchs C A, Gisin N, Griffiths R B et al. Optimal eavesdropping in quantum cryptography. I. Information bound and optimal strategy[J]. Physical Review A, 56, 1163-1172(1997).

    [15] Bennett C H, DiVincenzo D P, Smolin J A et al. Mixed-state entanglement and quantum error correction[J]. Physical Review A, 54, 3824-3851(1996).

    [16] Bruß D. Optimal eavesdropping in quantum cryptography with six states[J]. Physical Review Letters, 81, 3018-3021(1998).

    [17] Shor P W, Preskill J. Simple proof of security of the BB84 quantum key distribution protocol[J]. Physical Review Letters, 85, 441-444(2000).

    [18] Deutsch D, Ekert A, Jozsa R et al. Quantum privacy amplification and the security of quantum cryptography over noisy channels[J]. Physical Review Letters, 77, 2818-2821(1996).

    [19] Renner R. Security of quantum key distribution[J]. International Journal of Quantum Information, 6, 1-127(2008).

    [20] Wang X B. Beating the photon-number-splitting attack in practical quantum cryptography[J]. Physical Review Letters, 94, 230503(2005).

    [21] Lo H K, Ma X F, Chen K. Decoy state quantum key distribution[J]. Physical Review Letters, 94, 230504(2005).

    [22] Lo H K, Curty M, Qi B. Measurement-device-independent quantum key distribution[J]. Physical Review Letters, 108, 130503(2012).

    Tools

    Get Citation

    Copy Citation Text

    Wei JIA, Qiangqiang ZHANG, Yuxiang BIAN, Wei LI. Research on the upper bound of collective attack in E91-QKD[J]. Chinese Journal of Quantum Electronics, 2023, 40(3): 407

    Download Citation

    EndNote(RIS)BibTexPlain Text
    Save article for my favorites
    Paper Information

    Category:

    Received: Aug. 23, 2021

    Accepted: --

    Published Online: Jun. 30, 2023

    The Author Email: LI Wei (alfred_wl@njupt.edu.cn)

    DOI:10.3969/j.issn.1007-5461.2023.03.013

    Topics