Header menu link for other important links
Device Independent Key Generation Using Decoy State
S. Banerjee, B. Maiti,
Published in Springer Science and Business Media Deutschland GmbH
Volume: 1358
Pages: 169 - 177
It is a common belief that the unavailability of perfect single-photon source and detector will limit the feasibility of Quantum key distribution (QKD). A perfect device independent protocol can overcome this limitation in a long distance secure communication. This paper proposes to minimize the detector dependency at receiver’s end by introducing a device independent key generation protocol. Here, impurity is embedded in the data string using a decoy source. A one way function known to both Alice and Bob is guided to determine the subsequent basis for generating the key and the impurity. Since the basis of both key as well as impurity (decoy state) is fixed by this function, it provides self checking mechanism for both the legitimate users, thereby providing better results in key generation process by some imperfect devices at the receiver’s end. © 2020, Springer Nature Switzerland AG.
About the journal
JournalData powered by TypesetCommunications in Computer and Information Science
PublisherData powered by TypesetSpringer Science and Business Media Deutschland GmbH