TY - GEN
T1 - Entanglement measurement-device-independent Quantum Key Distribution
AU - Alshowkan, Muneer
AU - Elleithy, Khaled
N1 - Publisher Copyright:
© 2017 IEEE.
PY - 2017/8/3
Y1 - 2017/8/3
N2 - We propose a measurement-device-independent Quantum Key Distribution (MDI-QKD) protocol using weak coherent states and entanglement from weak coherent pulses. To overcome the side channel attacks, the sender and the receiver use decoy states to verify the security of the quantum channel. Then, they use uncorrelated entangled pairs to establish a correlated entanglement between them. The protocol establishes entangled communication channel between the sender and the receiver without performing the quantum distillation protocol. The protocol provides protection against side channel attacks such as photon-number-splitting (PNS). During the communication process, each party chooses to prepare a decoy state or a signal state. Then, they send their signals to a third party who performs Bell state measurement and then announces the measurement result. Using the information from the third party, who also could be an attacker, the sender and the receiver analyze the communication channel for any abnormalities. After verifying the security of the communication channel, the sender and the receiver establish the entanglement together for sharing secret keys.
AB - We propose a measurement-device-independent Quantum Key Distribution (MDI-QKD) protocol using weak coherent states and entanglement from weak coherent pulses. To overcome the side channel attacks, the sender and the receiver use decoy states to verify the security of the quantum channel. Then, they use uncorrelated entangled pairs to establish a correlated entanglement between them. The protocol establishes entangled communication channel between the sender and the receiver without performing the quantum distillation protocol. The protocol provides protection against side channel attacks such as photon-number-splitting (PNS). During the communication process, each party chooses to prepare a decoy state or a signal state. Then, they send their signals to a third party who performs Bell state measurement and then announces the measurement result. Using the information from the third party, who also could be an attacker, the sender and the receiver analyze the communication channel for any abnormalities. After verifying the security of the communication channel, the sender and the receiver establish the entanglement together for sharing secret keys.
KW - bell basis
KW - bell measurement
KW - entanglement
KW - measurement-device-independent
KW - quantum
UR - http://www.scopus.com/inward/record.url?scp=85028584689&partnerID=8YFLogxK
U2 - 10.1109/LISAT.2017.8001976
DO - 10.1109/LISAT.2017.8001976
M3 - Conference contribution
AN - SCOPUS:85028584689
T3 - 2017 IEEE Long Island Systems, Applications and Technology Conference, LISAT 2017
BT - 2017 IEEE Long Island Systems, Applications and Technology Conference, LISAT 2017
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2017 IEEE Long Island Systems, Applications and Technology Conference, LISAT 2017
Y2 - 5 May 2017
ER -