期刊文献+

Measurement-device-independent quantum cryptographic conferencing with an untrusted source

Measurement-device-independent quantum cryptographic conferencing with an untrusted source
下载PDF
导出
摘要 Measurement-device-independent quantum cryptographic conferencing(MDI-QCC) protocol puts MDI quantum key distribution(MDI-QKD) forwards to multi-party applications, and suggests a significant framework for practical multi-party quantum communication. In order to mitigate the experimental complexity of MDI-QCC and remove the key assumption(the sources are trusted) in MDI-QCC, we extend the framework of MDI-QKD with an untrusted source to MDI-QCC and give the rigorous security analysis of MDI-QCC with an untrusted source. What is more, in the security analysis we clearly provide a rigorous analytical method for parameters' estimation, which with simple modifications can be applied to not only MDI-QKD with an untrusted source but also arbitrary multi-party communication protocol with an untrusted source. The simulation results show that at reasonable distances the asymptotic key rates for the two cases(with trusted and untrusted sources) almost overlap, which indicates the feasibility of our protocol. Measurement-device-independent quantum cryptographic conferencing(MDI-QCC) protocol puts MDI quantum key distribution(MDI-QKD) forwards to multi-party applications, and suggests a significant framework for practical multi-party quantum communication. In order to mitigate the experimental complexity of MDI-QCC and remove the key assumption(the sources are trusted) in MDI-QCC, we extend the framework of MDI-QKD with an untrusted source to MDI-QCC and give the rigorous security analysis of MDI-QCC with an untrusted source. What is more, in the security analysis we clearly provide a rigorous analytical method for parameters' estimation, which with simple modifications can be applied to not only MDI-QKD with an untrusted source but also arbitrary multi-party communication protocol with an untrusted source. The simulation results show that at reasonable distances the asymptotic key rates for the two cases(with trusted and untrusted sources) almost overlap, which indicates the feasibility of our protocol.
作者 陈瑞柯 鲍皖苏 汪洋 包海泽 周淳 江木生 李宏伟 Rui-Ke Chen Wan-Su Bao Yang Wang Hai-Ze Bao Chun Zhou Mu-Sheng Jiang Hong-Wei Li(Zhengzhou Information Science and Technology Institute, Zhengzhou 450001, China Synergetic Innovation Center of Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei 230026, China)
出处 《Chinese Physics B》 SCIE EI CAS CSCD 2017年第1期115-124,共10页 中国物理B(英文版)
基金 supported by the National Basic Research Program of China(Grant No.2013CB338002) the National Natural Science Foundation of China(Grant Nos.11304397 and 61505261)
关键词 quantum cryptographic conferencing measurement-device-independent quantum key distribution untrusted source quantum cryptographic conferencing measurement-device-independent quantum key distribution untrusted source
  • 相关文献

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部