dc.contributor.author |
Sekga, Comfort |
|
dc.contributor.author |
Mafu, Mhlambululi |
|
dc.date.accessioned |
2021-08-24T13:38:11Z |
|
dc.date.available |
2021-08-24T13:38:11Z |
|
dc.date.issued |
2021-05 |
|
dc.identifier.citation |
Sekga, C. and Mafu, M. (2021) Security of quantum-key-distribution protocol by using the post-selection technique. Physics Open, 7, [100075]. https://doi.org/10.1016/j.physo.2021.100075 |
en_US |
dc.identifier.issn |
26660326 |
|
dc.identifier.uri |
http://repository.biust.ac.bw/handle/123456789/324 |
|
dc.description.abstract |
The post-selection technique was proposed by Christandl, König, and Renner [Phys. Rev. Lett. 102, 020504 (2009)] to simplify the security of quantum-key-distribution schemes. This work applies this technique to derive the security bounds for the six-state Scarani-Acin-Rigbordy-Gisin 2004 quantum key distribution protocol. This protocol can extract secure keys from a source emitting multi-photons due to its robustness from photon number splitting attacks, making it a good candidate for practical implementations. We also compare the security bounds for this protocol under collective attacks to the security bounds obtained after applying the post-selection technique when using finite resources. Our results demonstrate that the bounds for optimal attack are close to the bound for collective attack for many signals. Notably, the six-state SARG04 protocol proves to be more robust to the PNS attacks when compared to the original four-state SARG04 protocol. This demonstrates the power of the post-selection technique in deriving the security bounds for the six-state protocol when finite resources are used. |
en_US |
dc.description.sponsorship |
Botswana International University of Science and Technology Research Initiation Grants R00015 and S00100. |
en_US |
dc.language.iso |
en |
en_US |
dc.publisher |
Elsevier B.V. |
en_US |
dc.subject |
Quantum key distribution |
en_US |
dc.subject |
SARG04 protocol |
en_US |
dc.subject |
Post-selection technique |
en_US |
dc.subject |
Finite resources |
en_US |
dc.title |
Security of quantum-key-distribution protocol by using the post-selection technique |
en_US |
dc.description.level |
phd |
en_US |
dc.description.accessibility |
unrestricted |
en_US |
dc.description.department |
paa |
en_US |