Limits...
Security of modified Ping-Pong protocol in noisy and lossy channel.

Han YG, Yin ZQ, Li HW, Chen W, Wang S, Guo GC, Han ZF - Sci Rep (2014)

Bottom Line: Although this protocol was proposed in 2002, its security in the noisy and lossy channel has not been proven.In this report, we add a simple and experimentally feasible modification to the original PP protocol, and prove the security of this modified PP protocol against collective attacks when the noisy and lossy channel is taken into account.Simulation results show that our protocol is practical.

View Article: PubMed Central - PubMed

Affiliation: 1] Key Laboratory of Quantum Information, University of Science and Technology of China, Hefei 230026, China [2] Synergetic Innovation Center of Quantum Information & Quantum Physics, University of Science and Technology of China, Hefei, Anhui 230026, China [3].

ABSTRACT
The "Ping-Pong" (PP) protocol is a two-way quantum key protocol based on entanglement. In this protocol, Bob prepares one maximally entangled pair of qubits, and sends one qubit to Alice. Then, Alice performs some necessary operations on this qubit and sends it back to Bob. Although this protocol was proposed in 2002, its security in the noisy and lossy channel has not been proven. In this report, we add a simple and experimentally feasible modification to the original PP protocol, and prove the security of this modified PP protocol against collective attacks when the noisy and lossy channel is taken into account. Simulation results show that our protocol is practical.

No MeSH data available.


Simulation: Secure-key rate Lg(R) vs channel distance L (km) from Bob to Alice.We set ηd = 0.1, d = 10−5 per pulse. The detector error rate is 1%.
© Copyright Policy - open-access
Related In: Results  -  Collection

License
getmorefigures.php?uid=PMC4017212&req=5

f2: Simulation: Secure-key rate Lg(R) vs channel distance L (km) from Bob to Alice.We set ηd = 0.1, d = 10−5 per pulse. The detector error rate is 1%.

Mentions: To estimate the performance of our protocol, numerical simulation is given. In this simulation, we use the polarization state of photon transmitted in optical fiber to realize the coding system. On Bob's side, the home qubit is assumed to transmit in a round channel whose the efficiency is the same as the Bob-Alice-Bob channel for simplicity. We use off-the-shelf experimental parameters to establish the simulation, e.g., optical fiber is of an attenuation of 0.20 dB/km, detection efficiency is ηd = 10% and its dark count rate is pd = 10−5. Besides, we consider a misalignment of detector as de = 1%, η→ and η← in the key rate generation formula just equal the transmission efficiency of the corresponding optical fiber η. All the polarization error corresponding to comes from dark count of single photon detector, so . For the error rate between Alice and Bob, it only comes from dark count as . The overall secure-key generation rate is thus per trial. The simulation is shown in Fig. 2. This result show that the modified PP protocol can distribute secure-key bits for distant peers around 50 km.


Security of modified Ping-Pong protocol in noisy and lossy channel.

Han YG, Yin ZQ, Li HW, Chen W, Wang S, Guo GC, Han ZF - Sci Rep (2014)

Simulation: Secure-key rate Lg(R) vs channel distance L (km) from Bob to Alice.We set ηd = 0.1, d = 10−5 per pulse. The detector error rate is 1%.
© Copyright Policy - open-access
Related In: Results  -  Collection

License
Show All Figures
getmorefigures.php?uid=PMC4017212&req=5

f2: Simulation: Secure-key rate Lg(R) vs channel distance L (km) from Bob to Alice.We set ηd = 0.1, d = 10−5 per pulse. The detector error rate is 1%.
Mentions: To estimate the performance of our protocol, numerical simulation is given. In this simulation, we use the polarization state of photon transmitted in optical fiber to realize the coding system. On Bob's side, the home qubit is assumed to transmit in a round channel whose the efficiency is the same as the Bob-Alice-Bob channel for simplicity. We use off-the-shelf experimental parameters to establish the simulation, e.g., optical fiber is of an attenuation of 0.20 dB/km, detection efficiency is ηd = 10% and its dark count rate is pd = 10−5. Besides, we consider a misalignment of detector as de = 1%, η→ and η← in the key rate generation formula just equal the transmission efficiency of the corresponding optical fiber η. All the polarization error corresponding to comes from dark count of single photon detector, so . For the error rate between Alice and Bob, it only comes from dark count as . The overall secure-key generation rate is thus per trial. The simulation is shown in Fig. 2. This result show that the modified PP protocol can distribute secure-key bits for distant peers around 50 km.

Bottom Line: Although this protocol was proposed in 2002, its security in the noisy and lossy channel has not been proven.In this report, we add a simple and experimentally feasible modification to the original PP protocol, and prove the security of this modified PP protocol against collective attacks when the noisy and lossy channel is taken into account.Simulation results show that our protocol is practical.

View Article: PubMed Central - PubMed

Affiliation: 1] Key Laboratory of Quantum Information, University of Science and Technology of China, Hefei 230026, China [2] Synergetic Innovation Center of Quantum Information & Quantum Physics, University of Science and Technology of China, Hefei, Anhui 230026, China [3].

ABSTRACT
The "Ping-Pong" (PP) protocol is a two-way quantum key protocol based on entanglement. In this protocol, Bob prepares one maximally entangled pair of qubits, and sends one qubit to Alice. Then, Alice performs some necessary operations on this qubit and sends it back to Bob. Although this protocol was proposed in 2002, its security in the noisy and lossy channel has not been proven. In this report, we add a simple and experimentally feasible modification to the original PP protocol, and prove the security of this modified PP protocol against collective attacks when the noisy and lossy channel is taken into account. Simulation results show that our protocol is practical.

No MeSH data available.