BIUSTRE

Security of quantum-key-distribution protocol by using the post-selection technique

Show simple item record

dc.contributor.author Sekga, Comfort
dc.contributor.author Mafu, Mhlambululi
dc.date.accessioned 2021-08-24T13:38:11Z
dc.date.available 2021-08-24T13:38:11Z
dc.date.issued 2021-05
dc.identifier.citation Sekga, C. and Mafu, M. (2021) Security of quantum-key-distribution protocol by using the post-selection technique. Physics Open, 7, [100075]. https://doi.org/10.1016/j.physo.2021.100075 en_US
dc.identifier.issn 26660326
dc.identifier.uri http://repository.biust.ac.bw/handle/123456789/324
dc.description.abstract The post-selection technique was proposed by Christandl, König, and Renner [Phys. Rev. Lett. 102, 020504 (2009)] to simplify the security of quantum-key-distribution schemes. This work applies this technique to derive the security bounds for the six-state Scarani-Acin-Rigbordy-Gisin 2004 quantum key distribution protocol. This protocol can extract secure keys from a source emitting multi-photons due to its robustness from photon number splitting attacks, making it a good candidate for practical implementations. We also compare the security bounds for this protocol under collective attacks to the security bounds obtained after applying the post-selection technique when using finite resources. Our results demonstrate that the bounds for optimal attack are close to the bound for collective attack for many signals. Notably, the six-state SARG04 protocol proves to be more robust to the PNS attacks when compared to the original four-state SARG04 protocol. This demonstrates the power of the post-selection technique in deriving the security bounds for the six-state protocol when finite resources are used. en_US
dc.description.sponsorship Botswana International University of Science and Technology Research Initiation Grants R00015 and S00100. en_US
dc.language.iso en en_US
dc.publisher Elsevier B.V. en_US
dc.subject Quantum key distribution en_US
dc.subject SARG04 protocol en_US
dc.subject Post-selection technique en_US
dc.subject Finite resources en_US
dc.title Security of quantum-key-distribution protocol by using the post-selection technique en_US
dc.description.level phd en_US
dc.description.accessibility unrestricted en_US
dc.description.department paa en_US


Files in this item

This item appears in the following Collection(s)

  • Faculty of Sciences
    This collection is made up of pre and post research articles created by both staff and students from Faculty of Sciences

Show simple item record

Search BIUSTRE


Browse

My Account