- freely available
Quantum Flows for Secret Key Distribution in the Presence of the Photon Number Splitting Attack
AbstractPhysical implementations of quantum key distribution (QKD) protocols, like the Bennett-Brassard (BB84), are forced to use attenuated coherent quantum states, because the sources of single photon states are not functional yet for QKD applications. However, when using attenuated coherent states, the relatively high rate of multi-photonic pulses introduces vulnerabilities that can be exploited by the photon number splitting (PNS) attack to brake the quantum key. Some QKD protocols have been developed to be resistant to the PNS attack, like the decoy method, but those define a single photonic gain in the quantum channel. To overcome this limitation, we have developed a new QKD protocol, called ack-QKD, which is resistant to the PNS attack. Even more, it uses attenuated quantum states, but defines two interleaved photonic quantum flows to detect the eavesdropper activity by means of the quantum photonic error gain (QPEG) or the quantum bit error rate (QBER). The physical implementation of the ack-QKD is similar to the well-known BB84 protocol.
Share & Cite This Article
Lizama-Pérez, L.A.; López, J.M.; De Carlos-López, E.; Venegas-Andraca, S.E. Quantum Flows for Secret Key Distribution in the Presence of the Photon Number Splitting Attack. Entropy 2014, 16, 3121-3135.View more citation formats
Lizama-Pérez LA, López JM, De Carlos-López E, Venegas-Andraca SE. Quantum Flows for Secret Key Distribution in the Presence of the Photon Number Splitting Attack. Entropy. 2014; 16(6):3121-3135.Chicago/Turabian Style
Lizama-Pérez, Luis A.; López, J. M.; De Carlos-López, Eduardo; Venegas-Andraca, Salvador E. 2014. "Quantum Flows for Secret Key Distribution in the Presence of the Photon Number Splitting Attack." Entropy 16, no. 6: 3121-3135.
Notes: Multiple requests from the same IP address are counted as one view.