|
This article is cited in 22 scientific papers (total in 25 papers)
METHODOLOGICAL NOTES
Security of the decoy state method for quantum key distribution
A. S. Trushechkinab, E. O. Kiktenkoabcd, D. A. Kronbergacd, A. K. Fedorovcd a Steklov Mathematical Institute of Russian Academy of Sciences, Moscow
b National University of Science and Technology MISIS, Competence Center of the Quantum Communications National Technology Initiative, Moscow
c International Center for Quantum Optics and Quantum Technologies (Russian Quantum Center), Skolkovo, Moscow region
d Moscow Institute of Physics and Technology (National Research University), Dolgoprudny, Moscow region
Abstract:
Quantum cryptography or, more precisely, quantum key distribution (QKD), is one of the advanced areas in the field of quantum technologies. The confidentiality of keys distributed with the use of QKD protocols is guaranteed by the fundamental laws of quantum mechanics. This paper is devoted to the decoy state method, a countermeasure against vulnerabilities caused by the use of coherent states of light for QKD protocols whose security is proved under the assumption of single-photon states. We give a formal security proof of the decoy state method against all possible attacks. We compare two widely known attacks on multiphoton pulses: photon-number splitting and beam splitting. Finally, we discuss the equivalence of polarization and phase coding.
Received: March 23, 2020 Revised: October 19, 2020 Accepted: November 20, 2020
Citation:
A. S. Trushechkin, E. O. Kiktenko, D. A. Kronberg, A. K. Fedorov, “Security of the decoy state method for quantum key distribution”, UFN, 191:1 (2021), 93–109; Phys. Usp., 64:1 (2021), 88–102
Linking options:
https://www.mathnet.ru/eng/ufn6777 https://www.mathnet.ru/eng/ufn/v191/i1/p93
|
Statistics & downloads: |
Abstract page: | 582 | Full-text PDF : | 74 | References: | 44 | First page: | 34 |
|