Quantum Key Distribution: Security, Feasibility and Robustness

Xiang-Bin Wang
DOI: https://doi.org/10.1007/3-540-33133-6_8
2006-01-01
Abstract:Unlike from the existing classical protocols, a quantum key distribution (QKD) protocol can help two remote parties do secure private communication with proven security. We study various QKD protocols with special emphasis on security, feasibility and robustness. The security proof of the standard four-state protocol can be done based on the virtual entanglement purification by classical hashing. QKD can be done with unconditional security even when an imperfect source such as the coherent light from a traditional laser device is used. In particular, we show that one can do QKD effectively with a traditional laser device through the decoy-state method, i.e., changing the intensity of each pulse randomly among three values. One can improve the key rate and noise threshold if the channel noise is asymmetric. One can also do QKD more robustly with a two-qubit quantum code given that the channel noise is collective or independent.
What problem does this paper attempt to address?