Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Quantum circuit for the proof of the security of quantum key distribution without encryption of error syndrome and noisy processing

Kiyoshi Tamaki and Go Kato
Phys. Rev. A 81, 022316 – Published 16 February 2010

Abstract

One of the simplest security proofs of quantum key distribution is based on the so-called complementarity scenario, which involves the complementarity control of an actual protocol and a virtual protocol [M. Koashi, e-print arXiv:0704.3661 (2007)]. The existing virtual protocol has a limitation in classical postprocessing, i.e., the syndrome for the error-correction step has to be encrypted. In this paper, we remove this limitation by constructing a quantum circuit for the virtual protocol. Moreover, our circuit with a shield system gives an intuitive proof of why adding noise to the sifted key increases the bit error rate threshold in the general case in which one of the parties does not possess a qubit. Thus, our circuit bridges the simple proof and the use of wider classes of classical postprocessing.

  • Figure
  • Figure
  • Received 29 September 2009

DOI:https://doi.org/10.1103/PhysRevA.81.022316

©2010 American Physical Society

Authors & Affiliations

Kiyoshi Tamaki*

  • NTT Basic Research Laboratories, NTT Corporation, 3-1, Morinosato Wakamiya Atsugi-Shi, Kanagawa, 243-0198, Japan and CREST, JST Agency, 4-1-8 Honcho, Kawaguchi, Saitama, 332-0012, Japan

Go Kato

  • NTT Communication Science Laboratories, NTT Corporation, 3-1, Morinosato Wakamiya Atsugi-Shi, Kanagawa, 243-0198, Japan

  • *tamaki@will.brl.ntt.co.jp

Article Text (Subscription Required)

Click to Expand

References (Subscription Required)

Click to Expand
Issue

Vol. 81, Iss. 2 — February 2010

Reuse & Permissions
Access Options
Author publication services for translation and copyediting assistance advertisement

Authorization Required


×

Images

  • Figure 1
    Figure 1
    Schematics of our quantum circuit for the virtual protocol. “Bit Flip” consists of the identity and the bit-flip operation σ̂x, and “Purification” tries to purify the (nm) qubits by using μB and Sx(A).Reuse & Permissions
  • Figure 2
    Figure 2
    Schematics of the circuit for noisy processing. A difference from the circuit in Fig. 1 is the shield part, whose initial state is |ϕqS(n+s). Each code qubit is connected with each shield via the CNOT gate, and “PGM” represents the pretty good measurement.Reuse & Permissions
×

Sign up to receive regular email alerts from Physical Review A

Log In

Cancel
×

Search


Article Lookup

Paste a citation or DOI

Enter a citation
×