-
Quantum state in the channel is affected by several factors, which will bring detection error and make secure threshold of quantum distribution protocol unable to judge whether eavesdropping exists. We analyze the factors in real quantum channel, which affects the quantum state, develop a channel model, and derive a judging eavesdrop secure threshold formula of BB84 protocol based on an imperfect channel. Through calculating and simulating, the formula is proved to be more accurate to estimate the secure threshold of the BB84 protocol and more effective to judge eavesdropping. Meanwhile, this method can improve the security and the efficiency of key distribution.
-
Keywords:
- channel model /
- BB84 protocol /
- judge eavesdrop /
- secure threshold
[1] Bennett C H, Brassard G 1984 Int. Conference on Computers, Systems, and Signal Processing (Bangalore: IEEE) pp 175—179
[2] Bennett C H, Shor P W 1998 IEEE Trans.Inform.Theory 44 2724
[3] Holevo A S 1973 J.Multivar.Anal. vol.3,pp 337—394
[4] Yuen H P, Kennedy R S, Lax M 1975 Trans.Inform.Theory vol.IT-21, pp125—134
[5] Klimovitch G V 2001 Prov.IEEE Int.Symp.Information Theory(Washington DC) p123
[6] Peres A 1990 Foundations Phys. vol.20,pp1441—1453
[7] Su R K 2003 Quantum Mechanics (Beijing:Higher Education Press)p84—123(in Chinese)[苏汝铿 2003 量子力学 第二版 (北京 高等教育出版社) 第84—123页]
[8] Bostrom K,Felbinger T 2002 Phys.Rev.Lett. 89 187902
[9] Chen J, Li Y, Wu G, Zeng H P 2007 Acta Phys. Sin. 56 5243(in Chinese) [陈 杰、黎 遥、吴 光、曾和平 2007 56 5243]
[10] Wang C,Deng F G,Li Y S 2005 Phys.Rev. A 71 044305
[11] Wang J,Chen H Q,Zhang Q,Tang C J 2007 Acta Phys.Sin. 56 673(in Chinese)[王 剑、陈皇卿、张 权、唐朝京 2007 56 673]
[12] Kholeyo A S 1979 Probl.Pered.Inform.(Russian) 15 247
[13] Concha J I, Poor H V 2002 Int.Conf.Quantum Communication, Measurement and Computing(the United States)
[14] Zhu C H,Pei C X,Quan D X,Chen N,Yi Y H 2009 Acta Phys. Sin. 58 2184(in Chinese) [朱畅华、裴昌幸、权东晓、陈 南、易运晖 2009 58 2184]
[15] Concha J L, Poor H V 2004 Int.IEEE Transactions on Information Theory
[16] Ban M, Kurukowa K, Momose R, Hirota O 1997 Int.J.Theor.Phys. 36 1269
[17] Nelson L B, Poor H V 1995 IEEE Trans.Commun. 43 2803
[18] Noam Elron, Eldar U C 2005 quant-ph/0501084v2 19
[19] Kraus K 1971 Ann.Phys. 64 311
[20] He P S, You W L, Tian G S 2011 Chin.Phys. B 20 017503
-
[1] Bennett C H, Brassard G 1984 Int. Conference on Computers, Systems, and Signal Processing (Bangalore: IEEE) pp 175—179
[2] Bennett C H, Shor P W 1998 IEEE Trans.Inform.Theory 44 2724
[3] Holevo A S 1973 J.Multivar.Anal. vol.3,pp 337—394
[4] Yuen H P, Kennedy R S, Lax M 1975 Trans.Inform.Theory vol.IT-21, pp125—134
[5] Klimovitch G V 2001 Prov.IEEE Int.Symp.Information Theory(Washington DC) p123
[6] Peres A 1990 Foundations Phys. vol.20,pp1441—1453
[7] Su R K 2003 Quantum Mechanics (Beijing:Higher Education Press)p84—123(in Chinese)[苏汝铿 2003 量子力学 第二版 (北京 高等教育出版社) 第84—123页]
[8] Bostrom K,Felbinger T 2002 Phys.Rev.Lett. 89 187902
[9] Chen J, Li Y, Wu G, Zeng H P 2007 Acta Phys. Sin. 56 5243(in Chinese) [陈 杰、黎 遥、吴 光、曾和平 2007 56 5243]
[10] Wang C,Deng F G,Li Y S 2005 Phys.Rev. A 71 044305
[11] Wang J,Chen H Q,Zhang Q,Tang C J 2007 Acta Phys.Sin. 56 673(in Chinese)[王 剑、陈皇卿、张 权、唐朝京 2007 56 673]
[12] Kholeyo A S 1979 Probl.Pered.Inform.(Russian) 15 247
[13] Concha J I, Poor H V 2002 Int.Conf.Quantum Communication, Measurement and Computing(the United States)
[14] Zhu C H,Pei C X,Quan D X,Chen N,Yi Y H 2009 Acta Phys. Sin. 58 2184(in Chinese) [朱畅华、裴昌幸、权东晓、陈 南、易运晖 2009 58 2184]
[15] Concha J L, Poor H V 2004 Int.IEEE Transactions on Information Theory
[16] Ban M, Kurukowa K, Momose R, Hirota O 1997 Int.J.Theor.Phys. 36 1269
[17] Nelson L B, Poor H V 1995 IEEE Trans.Commun. 43 2803
[18] Noam Elron, Eldar U C 2005 quant-ph/0501084v2 19
[19] Kraus K 1971 Ann.Phys. 64 311
[20] He P S, You W L, Tian G S 2011 Chin.Phys. B 20 017503
Catalog
Metrics
- Abstract views: 9833
- PDF Downloads: 848
- Cited By: 0