A Security Proof of Measurement Device Independent Quantum Key Distribution: From the View of Information Theory

Although some ideal quantum key distribution protocols have been proved to be secure, there have been some demonstrations that practical quantum key distribution implementations were hacked due to some real-life imperfections. Among these attacks, detector side channel attacks may be the most seriou...

Full description

Saved in:
Bibliographic Details
Published inChinese physics letters Vol. 31; no. 7; pp. 16 - 19
Main Author 李芳毅 银振强 李宏伟 陈巍 王双 温浩 赵义博 韩正甫
Format Journal Article
LanguageEnglish
Published 01.07.2014
Subjects
Online AccessGet full text
ISSN0256-307X
1741-3540
DOI10.1088/0256-307X/31/7/070302

Cover

Abstract Although some ideal quantum key distribution protocols have been proved to be secure, there have been some demonstrations that practical quantum key distribution implementations were hacked due to some real-life imperfections. Among these attacks, detector side channel attacks may be the most serious. Recently, a measurement device independent quantum key distribution protocol [Phys. Rev. Lett. 108 (2012) 130503] was proposed and all detector side channel attacks are removed in this scheme. Here a new security proof based on quantum information theory is given. The eavesdropper's information of the sifted key bits is bounded. Then with this bound, the final secure key bit rate can be obtained.
AbstractList Although some ideal quantum key distribution protocols have been proved to be secure, there have been some demonstrations that practical quantum key distribution implementations were hacked due to some real-life imperfections. Among these attacks, detector side channel attacks may be the most serious. Recently, a measurement device independent quantum key distribution protocol [Phys. Rev. Lett. 108 (2012) 130503] was proposed and all detector side channel attacks are removed in this scheme. Here a new security proof based on quantum information theory is given. The eavesdropper's information of the sifted key bits is bounded. Then with this bound, the final secure key bit rate can be obtained.
Although some ideal quantum key distribution protocols have been proved to be secure, there have been some demonstrations that practical quantum key distribution implementations were hacked due to some real-life imperfections. Among these attacks, detector side channel attacks may be the most serious. Recently, a measurement device independent quantum key distribution protocol [Phys. Rev. Lett. 108 (2012) 130503] was proposed and all detector side channel attacks are removed in this scheme. Here a new security proof based on quantum information theory is given. The eavesdropper's information of the sifted key bits is bounded. Then with this bound, the final secure key bit rate can be obtained.
Author 李芳毅 银振强 李宏伟 陈巍 王双 温浩 赵义博 韩正甫
AuthorAffiliation Key Lab of Quantum Information, University of Science and Technology of China, Hefei 230026 Synergetic Innovation Center of Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei 230026 Information Engineering College, Zhejiang University of Technology, Hangzhou 310023 Anhui Qasky Quantum Science and Technology Co. Ltd., Wuhu 241002
Author_xml – sequence: 1
  fullname: 李芳毅 银振强 李宏伟 陈巍 王双 温浩 赵义博 韩正甫
BookMark eNqFkMFuFDEMhiNUJLaFR0CKOHEZ1lnPJFlxqlpKVxQBoiBuUSbr6QbtJNskQ7WvwrPwTrwCM2zVAxcky5bs_7Pl_5gdhRiIsecCXgnQeg6LRlYI6tscxVzNQQHC4hGbCVWLCpsajtjsQfOEHef8HUAILcSMpVP-mdyQfNnzjynGjo_xnmweEvUUCj-nH94RX4U17WhMY-vTYEMZev6O9vzc55J8OxQfw-9fP_lFij0vG-JfPd1Nu1ahi6m305xfbyim_VP2uLPbTM_u6wn7cvHm-uyyuvrwdnV2elU5FFiqziqpoK1F2yollKsVuDViK9C6JdW1QJTNWi5brXDRotVuoTsLoHSL0tYKT9jLw95dircD5WJ6nx1ttzZQHLIRUgKglKoZpc1B6lLMOVFndsn3Nu2NADN5bCb_zOSfQWGUOXg8cq__4Zwvf38tyfrtf-kX9_QmhptbH24ezkop5LLRoPEPviWQyg
CitedBy_id crossref_primary_10_1103_PhysRevA_92_012319
Cites_doi 10.1103/PhysRevLett.98.010503
10.1103/PhysRevLett.102.020504
10.1103/PhysRevLett.67.661
10.1103/RevModPhys.74.145
10.1103/PhysRevA.82.042335
10.1038/nature12493
10.1103/PhysRevLett.98.010505
10.1098/rspa.2004.1372
10.1088/1367-2630/11/4/045021
10.1063/1.1494475
10.1088/0256-307X/25/10/008
10.1038/nphoton.2010.214
10.1103/PhysRevLett.98.230501
10.1103/PhysRevA.78.042333
10.1103/PhysRevLett.98.010504
10.26421/QIC13.9-10-5
10.1063/1.2430685
10.26421/QIC4.5-1
10.1103/PhysRevLett.96.070502
10.1103/PhysRevLett.94.040503
10.1103/PhysRevA.88.062322
10.1007/s11128-013-0726-2
10.1103/PhysRevLett.108.130503
10.1103/PhysRevLett.103.170503
10.1364/OL.37.001008
10.1103/PhysRevA.88.052303
10.1103/PhysRevLett.111.130502
10.1103/PhysRevLett.111.130501
10.1364/OL.39.000880
10.1103/RevModPhys.81.1301
10.1103/PhysRevLett.85.441
10.1103/PhysRevA.86.022313
ContentType Journal Article
DBID 2RA
92L
CQIGP
~WA
AAYXX
CITATION
7TB
7U5
8FD
FR3
H8D
L7M
DOI 10.1088/0256-307X/31/7/070302
DatabaseName 维普期刊资源整合服务平台
中文科技期刊数据库-CALIS站点
维普中文期刊数据库
中文科技期刊数据库- 镜像站点
CrossRef
Mechanical & Transportation Engineering Abstracts
Solid State and Superconductivity Abstracts
Technology Research Database
Engineering Research Database
Aerospace Database
Advanced Technologies Database with Aerospace
DatabaseTitle CrossRef
Aerospace Database
Solid State and Superconductivity Abstracts
Engineering Research Database
Technology Research Database
Mechanical & Transportation Engineering Abstracts
Advanced Technologies Database with Aerospace
DatabaseTitleList
Aerospace Database
DeliveryMethod fulltext_linktorsrc
Discipline Physics
DocumentTitleAlternate A Security Proof of Measurement Device Independent Quantum Key Distribution: From the View of Information Theory
EISSN 1741-3540
EndPage 19
ExternalDocumentID 10_1088_0256_307X_31_7_070302
661695808
GroupedDBID 02O
042
1JI
1PV
1WK
29B
2RA
4.4
5B3
5GY
5VR
5VS
5ZH
7.M
7.Q
92L
AAGCD
AAJIO
AAJKP
AALHV
AATNI
ABHWH
ABJNI
ABQJV
ACAFW
ACGFS
ACHIP
AEFHF
AENEX
AFUIB
AFYNE
AHSEE
AKPSB
ALMA_UNASSIGNED_HOLDINGS
ASPBG
ATQHT
AVWKF
AZFZN
BBWZM
CEBXE
CJUJL
CQIGP
CRLBU
CS3
EBS
EDWGO
EJD
EMSAF
EPQRW
EQZZN
FEDTE
HAK
HVGLF
IHE
IJHAN
IOP
IZVLO
JCGBZ
KNG
KOT
LAP
M45
N5L
N9A
NS0
NT-
NT.
P2P
PJBAE
Q02
R4D
RIN
RNS
RO9
ROL
RPA
RW3
S3P
SY9
T37
UCJ
W28
XPP
~02
~WA
-SA
-S~
AAYXX
ACARI
ADEQX
AERVB
AGQPQ
AOAED
ARNYC
CAJEA
CITATION
Q--
TGP
U1G
U5K
7TB
7U5
8FD
AEINN
FR3
H8D
L7M
ID FETCH-LOGICAL-c313t-fa7670b41bb7717c470cd33b13ac9e4413365d69b8732b3a8c28fa0078b36a473
ISSN 0256-307X
IngestDate Sun Sep 28 00:47:42 EDT 2025
Thu Apr 24 23:12:50 EDT 2025
Tue Jul 01 01:35:23 EDT 2025
Wed Feb 14 10:35:08 EST 2024
IsPeerReviewed true
IsScholarly true
Issue 7
Language English
License http://iopscience.iop.org/info/page/text-and-data-mining
http://iopscience.iop.org/page/copyright
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c313t-fa7670b41bb7717c470cd33b13ac9e4413365d69b8732b3a8c28fa0078b36a473
Notes LI Fang-Yi , YIN Zhen-Qiang , LI Hong-Wei , CHEN Wei, WANG Shuang , WEN Hao, ZHAO Yi-Bo , HAN Zheng-Fu(1Key Lab of Quantum Information, University of Science and Technology of China, Hefei 230026 ;2 Synergetic Innovation Center of Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei 230026 ; 3 Information Engineering College, Zhejiang University of Technology, Hangzhou 310023 ; 4 Anhui Qasky Quantum Science and Technology Co. Ltd., Wuhu 241002)
11-1959/O4
Although some ideal quantum key distribution protocols have been proved to be secure, there have been some demonstrations that practical quantum key distribution implementations were hacked due to some real-life imperfections. Among these attacks, detector side channel attacks may be the most serious. Recently, a measurement device independent quantum key distribution protocol [Phys. Rev. Lett. 108 (2012) 130503] was proposed and all detector side channel attacks are removed in this scheme. Here a new security proof based on quantum information theory is given. The eavesdropper's information of the sifted key bits is bounded. Then with this bound, the final secure key bit rate can be obtained.
ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 23
PQID 1660036675
PQPubID 23500
PageCount 4
ParticipantIDs proquest_miscellaneous_1660036675
crossref_primary_10_1088_0256_307X_31_7_070302
crossref_citationtrail_10_1088_0256_307X_31_7_070302
chongqing_primary_661695808
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2014-07-01
PublicationDateYYYYMMDD 2014-07-01
PublicationDate_xml – month: 07
  year: 2014
  text: 2014-07-01
  day: 01
PublicationDecade 2010
PublicationTitle Chinese physics letters
PublicationTitleAlternate Chinese Physics Letters
PublicationYear 2014
References 22
Gottesman D (6) 2004; 4
23
Zhao Y (17) 2006
24
26
27
28
30
31
10
32
Bennett C H (2) 1984
Tang Z Y (29) 2013
33
12
34
13
35
14
15
16
18
Pironio S (25) 2009; 11
1
Yin Z Q (19) 2008; 25
3
4
5
7
Yin Z Q (11) 2013; 13
8
9
20
21
References_xml – ident: 15
  doi: 10.1103/PhysRevLett.98.010503
– year: 2013
  ident: 29
– ident: 35
  doi: 10.1103/PhysRevLett.102.020504
– ident: 3
  doi: 10.1103/PhysRevLett.67.661
– ident: 4
  doi: 10.1103/RevModPhys.74.145
– ident: 9
  doi: 10.1103/PhysRevA.82.042335
– ident: 21
  doi: 10.1038/nature12493
– ident: 14
  doi: 10.1103/PhysRevLett.98.010505
– ident: 32
  doi: 10.1098/rspa.2004.1372
– volume: 11
  start-page: 045021
  issn: 1367-2630
  year: 2009
  ident: 25
  publication-title: New J. Phys.
  doi: 10.1088/1367-2630/11/4/045021
– ident: 34
  doi: 10.1063/1.1494475
– volume: 25
  start-page: 3547
  issn: 0256-307X
  year: 2008
  ident: 19
  publication-title: Chin. Phys. Lett.
  doi: 10.1088/0256-307X/25/10/008
– ident: 23
  doi: 10.1038/nphoton.2010.214
– ident: 24
  doi: 10.1103/PhysRevLett.98.230501
– ident: 22
  doi: 10.1103/PhysRevA.78.042333
– ident: 16
  doi: 10.1103/PhysRevLett.98.010504
– volume: 13
  start-page: 0827
  issn: 1533-7146
  year: 2013
  ident: 11
  publication-title: Quantum Inf. Comput.
  doi: 10.26421/QIC13.9-10-5
– start-page: 2094
  year: 2006
  ident: 17
– ident: 18
  doi: 10.1063/1.2430685
– start-page: 175
  year: 1984
  ident: 2
– volume: 4
  start-page: 325
  issn: 1533-7146
  year: 2004
  ident: 6
  publication-title: Quantum Inf. Comput.
  doi: 10.26421/QIC4.5-1
– ident: 13
  doi: 10.1103/PhysRevLett.96.070502
– ident: 7
  doi: 10.1103/PhysRevLett.94.040503
– ident: 12
  doi: 10.1103/PhysRevA.88.062322
– ident: 30
  doi: 10.1007/s11128-013-0726-2
– ident: 1
  doi: 10.1103/PhysRevLett.108.130503
– ident: 8
  doi: 10.1103/PhysRevLett.103.170503
– ident: 20
  doi: 10.1364/OL.37.001008
– ident: 28
  doi: 10.1103/PhysRevA.88.052303
– ident: 27
  doi: 10.1103/PhysRevLett.111.130502
– ident: 26
  doi: 10.1103/PhysRevLett.111.130501
– ident: 31
  doi: 10.1364/OL.39.000880
– ident: 33
  doi: 10.1103/RevModPhys.81.1301
– ident: 5
  doi: 10.1103/PhysRevLett.85.441
– ident: 10
  doi: 10.1103/PhysRevA.86.022313
SSID ssj0011811
Score 2.075591
Snippet Although some ideal quantum key distribution protocols have been proved to be secure, there have been some demonstrations that practical quantum key...
SourceID proquest
crossref
chongqing
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 16
SubjectTerms Channels
Computer information security
Defects
Information theory
Measuring instruments
Proving
安全密钥
安全性
测量
设备无关
证明
量子信息理论
量子密钥分配协议
黑客攻击
Title A Security Proof of Measurement Device Independent Quantum Key Distribution: From the View of Information Theory
URI http://lib.cqvip.com/qk/84212X/201407/661695808.html
https://www.proquest.com/docview/1660036675
Volume 31
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3bbtNAEF2FIiReEFcRCmiReKvc2F7bu-YtKkQR1yK1EHhZee11g1ScQp0X_oV_ZWZvcVAFFCWyrJU9ljzHx8ezM7OEPM15y0XViKhRZRVlWqdRGWdJVOQ65UkGP4a1w2_eFvPj7OUiX4xGPwdZS-te7dc_Lqwr-R-vwhj4FatkL-HZYBQGYB_8C1vwMGz_ycdTFy43ZX4rkH2Yz7IJ-mFGEPAAcIBf6rbHJE54y3zdewVc8Byb5rr1rjAyMPOlJh9cNYurVTIQCUX8m8YGS7N8pQuOnO-dmsqgoNFfmzyBWdWdRJ--BHKxLQs-L3UXvQdknmwfPV_B0R91OPzA1Y74IReeSLKQyupZDDQVBrgW9oVjWRZkTIQBpyENs2QANz7gVOSk9EK2B4Y0jTHcFWCfIf3jJHQcztrusf3buy9kJJq5eCEkGpNoTLJEcmnNXCFXUw7SDOtD3x2GSSoQR2ZBRn99XyAmxCSMTVgy4RNrBtt3LOE-fgNRsi2DtlWAkTZHN8kN901CpxZgt8hId7fJtUPr1jvkbEo9zKiBGYX_AGbUwowOYEYdzCjAjA5h9owiyCiAjCLI0NIAZNSC7C45nr04OphHbqGOqGYJ66O24gWPVZYoxXnC64zHdcOYgue8LjUIbsaKvClKJThLFatEnYq2QnWqWFFlnN0jO92q0_cJZW1clynwSqpBX_G2EoVQdabKWjW8zdmY7IZ7KM9sQxYJGrMocxGLMcn8XZW163GPS62cyj_6d0z2w2ne5l9OeOJdJoGOcY6t6vRqfS6TosAWT_AZ_uCyRnfJ9c0D9JDs9N_X-hEo3l49Nrj7BRTIorE
linkProvider IOP Publishing
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+Security+Proof+of+Measurement+Device+Independent+Quantum+Key+Distribution%3A+From+the+View+of+Information+Theory&rft.jtitle=Chinese+physics+letters&rft.au=Li%2C+Fang-Yi&rft.au=Yin%2C+Zhen-Qiang&rft.au=Li%2C+Hong-Wei&rft.au=Chen%2C+Wei&rft.date=2014-07-01&rft.issn=0256-307X&rft.eissn=1741-3540&rft.volume=31&rft.issue=7&rft.spage=70302&rft_id=info:doi/10.1088%2F0256-307X%2F31%2F7%2F070302&rft.externalDBID=n%2Fa&rft.externalDocID=10_1088_0256_307X_31_7_070302
thumbnail_s http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=http%3A%2F%2Fimage.cqvip.com%2Fvip1000%2Fqk%2F84212X%2F84212X.jpg