A Security Proof of Measurement Device Independent Quantum Key Distribution: From the View of Information Theory
Although some ideal quantum key distribution protocols have been proved to be secure, there have been some demonstrations that practical quantum key distribution implementations were hacked due to some real-life imperfections. Among these attacks, detector side channel attacks may be the most seriou...
Saved in:
Published in | Chinese physics letters Vol. 31; no. 7; pp. 16 - 19 |
---|---|
Main Author | |
Format | Journal Article |
Language | English |
Published |
01.07.2014
|
Subjects | |
Online Access | Get full text |
ISSN | 0256-307X 1741-3540 |
DOI | 10.1088/0256-307X/31/7/070302 |
Cover
Abstract | Although some ideal quantum key distribution protocols have been proved to be secure, there have been some demonstrations that practical quantum key distribution implementations were hacked due to some real-life imperfections. Among these attacks, detector side channel attacks may be the most serious. Recently, a measurement device independent quantum key distribution protocol [Phys. Rev. Lett. 108 (2012) 130503] was proposed and all detector side channel attacks are removed in this scheme. Here a new security proof based on quantum information theory is given. The eavesdropper's information of the sifted key bits is bounded. Then with this bound, the final secure key bit rate can be obtained. |
---|---|
AbstractList | Although some ideal quantum key distribution protocols have been proved to be secure, there have been some demonstrations that practical quantum key distribution implementations were hacked due to some real-life imperfections. Among these attacks, detector side channel attacks may be the most serious. Recently, a measurement device independent quantum key distribution protocol [Phys. Rev. Lett. 108 (2012) 130503] was proposed and all detector side channel attacks are removed in this scheme. Here a new security proof based on quantum information theory is given. The eavesdropper's information of the sifted key bits is bounded. Then with this bound, the final secure key bit rate can be obtained. Although some ideal quantum key distribution protocols have been proved to be secure, there have been some demonstrations that practical quantum key distribution implementations were hacked due to some real-life imperfections. Among these attacks, detector side channel attacks may be the most serious. Recently, a measurement device independent quantum key distribution protocol [Phys. Rev. Lett. 108 (2012) 130503] was proposed and all detector side channel attacks are removed in this scheme. Here a new security proof based on quantum information theory is given. The eavesdropper's information of the sifted key bits is bounded. Then with this bound, the final secure key bit rate can be obtained. |
Author | 李芳毅 银振强 李宏伟 陈巍 王双 温浩 赵义博 韩正甫 |
AuthorAffiliation | Key Lab of Quantum Information, University of Science and Technology of China, Hefei 230026 Synergetic Innovation Center of Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei 230026 Information Engineering College, Zhejiang University of Technology, Hangzhou 310023 Anhui Qasky Quantum Science and Technology Co. Ltd., Wuhu 241002 |
Author_xml | – sequence: 1 fullname: 李芳毅 银振强 李宏伟 陈巍 王双 温浩 赵义博 韩正甫 |
BookMark | eNqFkMFuFDEMhiNUJLaFR0CKOHEZ1lnPJFlxqlpKVxQBoiBuUSbr6QbtJNskQ7WvwrPwTrwCM2zVAxcky5bs_7Pl_5gdhRiIsecCXgnQeg6LRlYI6tscxVzNQQHC4hGbCVWLCpsajtjsQfOEHef8HUAILcSMpVP-mdyQfNnzjynGjo_xnmweEvUUCj-nH94RX4U17WhMY-vTYEMZev6O9vzc55J8OxQfw-9fP_lFij0vG-JfPd1Nu1ahi6m305xfbyim_VP2uLPbTM_u6wn7cvHm-uyyuvrwdnV2elU5FFiqziqpoK1F2yollKsVuDViK9C6JdW1QJTNWi5brXDRotVuoTsLoHSL0tYKT9jLw95dircD5WJ6nx1ttzZQHLIRUgKglKoZpc1B6lLMOVFndsn3Nu2NADN5bCb_zOSfQWGUOXg8cq__4Zwvf38tyfrtf-kX9_QmhptbH24ezkop5LLRoPEPviWQyg |
CitedBy_id | crossref_primary_10_1103_PhysRevA_92_012319 |
Cites_doi | 10.1103/PhysRevLett.98.010503 10.1103/PhysRevLett.102.020504 10.1103/PhysRevLett.67.661 10.1103/RevModPhys.74.145 10.1103/PhysRevA.82.042335 10.1038/nature12493 10.1103/PhysRevLett.98.010505 10.1098/rspa.2004.1372 10.1088/1367-2630/11/4/045021 10.1063/1.1494475 10.1088/0256-307X/25/10/008 10.1038/nphoton.2010.214 10.1103/PhysRevLett.98.230501 10.1103/PhysRevA.78.042333 10.1103/PhysRevLett.98.010504 10.26421/QIC13.9-10-5 10.1063/1.2430685 10.26421/QIC4.5-1 10.1103/PhysRevLett.96.070502 10.1103/PhysRevLett.94.040503 10.1103/PhysRevA.88.062322 10.1007/s11128-013-0726-2 10.1103/PhysRevLett.108.130503 10.1103/PhysRevLett.103.170503 10.1364/OL.37.001008 10.1103/PhysRevA.88.052303 10.1103/PhysRevLett.111.130502 10.1103/PhysRevLett.111.130501 10.1364/OL.39.000880 10.1103/RevModPhys.81.1301 10.1103/PhysRevLett.85.441 10.1103/PhysRevA.86.022313 |
ContentType | Journal Article |
DBID | 2RA 92L CQIGP ~WA AAYXX CITATION 7TB 7U5 8FD FR3 H8D L7M |
DOI | 10.1088/0256-307X/31/7/070302 |
DatabaseName | 维普期刊资源整合服务平台 中文科技期刊数据库-CALIS站点 维普中文期刊数据库 中文科技期刊数据库- 镜像站点 CrossRef Mechanical & Transportation Engineering Abstracts Solid State and Superconductivity Abstracts Technology Research Database Engineering Research Database Aerospace Database Advanced Technologies Database with Aerospace |
DatabaseTitle | CrossRef Aerospace Database Solid State and Superconductivity Abstracts Engineering Research Database Technology Research Database Mechanical & Transportation Engineering Abstracts Advanced Technologies Database with Aerospace |
DatabaseTitleList | Aerospace Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Physics |
DocumentTitleAlternate | A Security Proof of Measurement Device Independent Quantum Key Distribution: From the View of Information Theory |
EISSN | 1741-3540 |
EndPage | 19 |
ExternalDocumentID | 10_1088_0256_307X_31_7_070302 661695808 |
GroupedDBID | 02O 042 1JI 1PV 1WK 29B 2RA 4.4 5B3 5GY 5VR 5VS 5ZH 7.M 7.Q 92L AAGCD AAJIO AAJKP AALHV AATNI ABHWH ABJNI ABQJV ACAFW ACGFS ACHIP AEFHF AENEX AFUIB AFYNE AHSEE AKPSB ALMA_UNASSIGNED_HOLDINGS ASPBG ATQHT AVWKF AZFZN BBWZM CEBXE CJUJL CQIGP CRLBU CS3 EBS EDWGO EJD EMSAF EPQRW EQZZN FEDTE HAK HVGLF IHE IJHAN IOP IZVLO JCGBZ KNG KOT LAP M45 N5L N9A NS0 NT- NT. P2P PJBAE Q02 R4D RIN RNS RO9 ROL RPA RW3 S3P SY9 T37 UCJ W28 XPP ~02 ~WA -SA -S~ AAYXX ACARI ADEQX AERVB AGQPQ AOAED ARNYC CAJEA CITATION Q-- TGP U1G U5K 7TB 7U5 8FD AEINN FR3 H8D L7M |
ID | FETCH-LOGICAL-c313t-fa7670b41bb7717c470cd33b13ac9e4413365d69b8732b3a8c28fa0078b36a473 |
ISSN | 0256-307X |
IngestDate | Sun Sep 28 00:47:42 EDT 2025 Thu Apr 24 23:12:50 EDT 2025 Tue Jul 01 01:35:23 EDT 2025 Wed Feb 14 10:35:08 EST 2024 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 7 |
Language | English |
License | http://iopscience.iop.org/info/page/text-and-data-mining http://iopscience.iop.org/page/copyright |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-c313t-fa7670b41bb7717c470cd33b13ac9e4413365d69b8732b3a8c28fa0078b36a473 |
Notes | LI Fang-Yi , YIN Zhen-Qiang , LI Hong-Wei , CHEN Wei, WANG Shuang , WEN Hao, ZHAO Yi-Bo , HAN Zheng-Fu(1Key Lab of Quantum Information, University of Science and Technology of China, Hefei 230026 ;2 Synergetic Innovation Center of Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei 230026 ; 3 Information Engineering College, Zhejiang University of Technology, Hangzhou 310023 ; 4 Anhui Qasky Quantum Science and Technology Co. Ltd., Wuhu 241002) 11-1959/O4 Although some ideal quantum key distribution protocols have been proved to be secure, there have been some demonstrations that practical quantum key distribution implementations were hacked due to some real-life imperfections. Among these attacks, detector side channel attacks may be the most serious. Recently, a measurement device independent quantum key distribution protocol [Phys. Rev. Lett. 108 (2012) 130503] was proposed and all detector side channel attacks are removed in this scheme. Here a new security proof based on quantum information theory is given. The eavesdropper's information of the sifted key bits is bounded. Then with this bound, the final secure key bit rate can be obtained. ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 23 |
PQID | 1660036675 |
PQPubID | 23500 |
PageCount | 4 |
ParticipantIDs | proquest_miscellaneous_1660036675 crossref_primary_10_1088_0256_307X_31_7_070302 crossref_citationtrail_10_1088_0256_307X_31_7_070302 chongqing_primary_661695808 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2014-07-01 |
PublicationDateYYYYMMDD | 2014-07-01 |
PublicationDate_xml | – month: 07 year: 2014 text: 2014-07-01 day: 01 |
PublicationDecade | 2010 |
PublicationTitle | Chinese physics letters |
PublicationTitleAlternate | Chinese Physics Letters |
PublicationYear | 2014 |
References | 22 Gottesman D (6) 2004; 4 23 Zhao Y (17) 2006 24 26 27 28 30 31 10 32 Bennett C H (2) 1984 Tang Z Y (29) 2013 33 12 34 13 35 14 15 16 18 Pironio S (25) 2009; 11 1 Yin Z Q (19) 2008; 25 3 4 5 7 Yin Z Q (11) 2013; 13 8 9 20 21 |
References_xml | – ident: 15 doi: 10.1103/PhysRevLett.98.010503 – year: 2013 ident: 29 – ident: 35 doi: 10.1103/PhysRevLett.102.020504 – ident: 3 doi: 10.1103/PhysRevLett.67.661 – ident: 4 doi: 10.1103/RevModPhys.74.145 – ident: 9 doi: 10.1103/PhysRevA.82.042335 – ident: 21 doi: 10.1038/nature12493 – ident: 14 doi: 10.1103/PhysRevLett.98.010505 – ident: 32 doi: 10.1098/rspa.2004.1372 – volume: 11 start-page: 045021 issn: 1367-2630 year: 2009 ident: 25 publication-title: New J. Phys. doi: 10.1088/1367-2630/11/4/045021 – ident: 34 doi: 10.1063/1.1494475 – volume: 25 start-page: 3547 issn: 0256-307X year: 2008 ident: 19 publication-title: Chin. Phys. Lett. doi: 10.1088/0256-307X/25/10/008 – ident: 23 doi: 10.1038/nphoton.2010.214 – ident: 24 doi: 10.1103/PhysRevLett.98.230501 – ident: 22 doi: 10.1103/PhysRevA.78.042333 – ident: 16 doi: 10.1103/PhysRevLett.98.010504 – volume: 13 start-page: 0827 issn: 1533-7146 year: 2013 ident: 11 publication-title: Quantum Inf. Comput. doi: 10.26421/QIC13.9-10-5 – start-page: 2094 year: 2006 ident: 17 – ident: 18 doi: 10.1063/1.2430685 – start-page: 175 year: 1984 ident: 2 – volume: 4 start-page: 325 issn: 1533-7146 year: 2004 ident: 6 publication-title: Quantum Inf. Comput. doi: 10.26421/QIC4.5-1 – ident: 13 doi: 10.1103/PhysRevLett.96.070502 – ident: 7 doi: 10.1103/PhysRevLett.94.040503 – ident: 12 doi: 10.1103/PhysRevA.88.062322 – ident: 30 doi: 10.1007/s11128-013-0726-2 – ident: 1 doi: 10.1103/PhysRevLett.108.130503 – ident: 8 doi: 10.1103/PhysRevLett.103.170503 – ident: 20 doi: 10.1364/OL.37.001008 – ident: 28 doi: 10.1103/PhysRevA.88.052303 – ident: 27 doi: 10.1103/PhysRevLett.111.130502 – ident: 26 doi: 10.1103/PhysRevLett.111.130501 – ident: 31 doi: 10.1364/OL.39.000880 – ident: 33 doi: 10.1103/RevModPhys.81.1301 – ident: 5 doi: 10.1103/PhysRevLett.85.441 – ident: 10 doi: 10.1103/PhysRevA.86.022313 |
SSID | ssj0011811 |
Score | 2.075591 |
Snippet | Although some ideal quantum key distribution protocols have been proved to be secure, there have been some demonstrations that practical quantum key... |
SourceID | proquest crossref chongqing |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 16 |
SubjectTerms | Channels Computer information security Defects Information theory Measuring instruments Proving 安全密钥 安全性 测量 设备无关 证明 量子信息理论 量子密钥分配协议 黑客攻击 |
Title | A Security Proof of Measurement Device Independent Quantum Key Distribution: From the View of Information Theory |
URI | http://lib.cqvip.com/qk/84212X/201407/661695808.html https://www.proquest.com/docview/1660036675 |
Volume | 31 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3bbtNAEF2FIiReEFcRCmiReKvc2F7bu-YtKkQR1yK1EHhZee11g1ScQp0X_oV_ZWZvcVAFFCWyrJU9ljzHx8ezM7OEPM15y0XViKhRZRVlWqdRGWdJVOQ65UkGP4a1w2_eFvPj7OUiX4xGPwdZS-te7dc_Lqwr-R-vwhj4FatkL-HZYBQGYB_8C1vwMGz_ycdTFy43ZX4rkH2Yz7IJ-mFGEPAAcIBf6rbHJE54y3zdewVc8Byb5rr1rjAyMPOlJh9cNYurVTIQCUX8m8YGS7N8pQuOnO-dmsqgoNFfmzyBWdWdRJ--BHKxLQs-L3UXvQdknmwfPV_B0R91OPzA1Y74IReeSLKQyupZDDQVBrgW9oVjWRZkTIQBpyENs2QANz7gVOSk9EK2B4Y0jTHcFWCfIf3jJHQcztrusf3buy9kJJq5eCEkGpNoTLJEcmnNXCFXUw7SDOtD3x2GSSoQR2ZBRn99XyAmxCSMTVgy4RNrBtt3LOE-fgNRsi2DtlWAkTZHN8kN901CpxZgt8hId7fJtUPr1jvkbEo9zKiBGYX_AGbUwowOYEYdzCjAjA5h9owiyCiAjCLI0NIAZNSC7C45nr04OphHbqGOqGYJ66O24gWPVZYoxXnC64zHdcOYgue8LjUIbsaKvClKJThLFatEnYq2QnWqWFFlnN0jO92q0_cJZW1clynwSqpBX_G2EoVQdabKWjW8zdmY7IZ7KM9sQxYJGrMocxGLMcn8XZW163GPS62cyj_6d0z2w2ne5l9OeOJdJoGOcY6t6vRqfS6TosAWT_AZ_uCyRnfJ9c0D9JDs9N_X-hEo3l49Nrj7BRTIorE |
linkProvider | IOP Publishing |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+Security+Proof+of+Measurement+Device+Independent+Quantum+Key+Distribution%3A+From+the+View+of+Information+Theory&rft.jtitle=Chinese+physics+letters&rft.au=Li%2C+Fang-Yi&rft.au=Yin%2C+Zhen-Qiang&rft.au=Li%2C+Hong-Wei&rft.au=Chen%2C+Wei&rft.date=2014-07-01&rft.issn=0256-307X&rft.eissn=1741-3540&rft.volume=31&rft.issue=7&rft.spage=70302&rft_id=info:doi/10.1088%2F0256-307X%2F31%2F7%2F070302&rft.externalDBID=n%2Fa&rft.externalDocID=10_1088_0256_307X_31_7_070302 |
thumbnail_s | http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=http%3A%2F%2Fimage.cqvip.com%2Fvip1000%2Fqk%2F84212X%2F84212X.jpg |