Next Article in Journal
Minimum Entropy-Based Cascade Control for Governing Hydroelectric Turbines
Next Article in Special Issue
Block Access Token Renewal Scheme Based on Secret Sharing in Apache Hadoop
Previous Article in Journal
Analysis and Optimization of a Compressed Air Energy Storage—Combined Cycle System
Article Menu

Export Article

Open AccessArticle
Entropy 2014, 16(6), 3121-3135; doi:10.3390/e16063121

Quantum Flows for Secret Key Distribution in the Presence of the Photon Number Splitting Attack

1
Time and Frequency Division, Centro Nacional de Metrología, Carr. a los Cués Km. 4.5,Municipio El Marqués, Querétaro C.P. 76246, Mexico
2
Tecnológico de Monterrey, Campus Estado de México, Carr. a Lago de Guadalupe Km. 3.5, Atizapán de Zaragoza, Estado de México C.P. 52926, Mexico
*
Author to whom correspondence should be addressed.
Received: 8 April 2014 / Revised: 23 May 2014 / Accepted: 29 May 2014 / Published: 5 June 2014
View Full-Text   |   Download PDF [3598 KB, 24 February 2015; original version 24 February 2015]   |  

Abstract

Physical implementations of quantum key distribution (QKD) protocols, like the Bennett-Brassard (BB84), are forced to use attenuated coherent quantum states, because the sources of single photon states are not functional yet for QKD applications. However, when using attenuated coherent states, the relatively high rate of multi-photonic pulses introduces vulnerabilities that can be exploited by the photon number splitting (PNS) attack to brake the quantum key. Some QKD protocols have been developed to be resistant to the PNS attack, like the decoy method, but those define a single photonic gain in the quantum channel. To overcome this limitation, we have developed a new QKD protocol, called ack-QKD, which is resistant to the PNS attack. Even more, it uses attenuated quantum states, but defines two interleaved photonic quantum flows to detect the eavesdropper activity by means of the quantum photonic error gain (QPEG) or the quantum bit error rate (QBER). The physical implementation of the ack-QKD is similar to the well-known BB84 protocol.
Keywords: QKD; PNS; ack-QKD; bi-qubit; quantum photonic error gain; ΔQ QKD; PNS; ack-QKD; bi-qubit; quantum photonic error gain; ΔQ
This is an open access article distributed under the Creative Commons Attribution License (CC BY 3.0).

Scifeed alert for new publications

Never miss any articles matching your research from any publisher
  • Get alerts for new papers matching your research
  • Find out the new papers from selected authors
  • Updated daily for 49'000+ journals and 6000+ publishers
  • Define your Scifeed now

SciFeed Share & Cite This Article

MDPI and ACS Style

Lizama-Pérez, L.A.; López, J.M.; De Carlos-López, E.; Venegas-Andraca, S.E. Quantum Flows for Secret Key Distribution in the Presence of the Photon Number Splitting Attack. Entropy 2014, 16, 3121-3135.

Show more citation formats Show less citations formats

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Entropy EISSN 1099-4300 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top