Detecting two-party quantum correlations in quantum-key-distribution protocols
- 11 February 2005
- journal article
- research article
- Published by American Physical Society (APS) in Physical Review A
- Vol. 71 (2) , 022306
- https://doi.org/10.1103/physreva.71.022306
Abstract
A necessary precondition for secure quantum key distribution is that sender and receiver can prove the presence of entanglement in a quantum state that is effectively distributed between them. In order to deliver this entanglement proof one can use the class of entanglement witness (EW) operators that can be constructed from the available measurements results. This class of EWs can be used to provide a necessary and sufficient condition for the existence of quantum correlations even when a quantum state cannot be completely reconstructed. The set of optimal EWs for two well-known entanglement-based (EB) schemes, the six-state and the four-state EB protocols, has been obtained recently [M. Curty et al., Phys. Rev. Lett. 92, 217903 (2004).] Here we complete these results, now showing specifically the analysis for the case of prepare and measure (PM) schemes. For this, we investigate the signal states and detection methods of the four-state and the two-state PM schemes. For each of these protocols we obtain a reduced set of EWs. More importantly, each set of EWs can be used to derive a necessary and sufficient condition to prove that quantum correlations are present in these protocols.Keywords
All Related Versions
This publication has 70 references indexed in Scilit:
- Handbook of Applied CryptographyPublished by Taylor & Francis ,2018
- Entanglement as a Precondition for Secure Quantum Key DistributionPhysical Review Letters, 2004
- Quantum noise of laser diodesJournal of Modern Optics, 2000
- Quantum key distribution: theory for applicationApplied Physics B Laser and Optics, 1999
- Optimal Eavesdropping in Quantum Cryptography with Six StatesPhysical Review Letters, 1998
- Separability of mixed states: necessary and sufficient conditionsPhysics Letters A, 1996
- Quantum cryptography without Bell’s theoremPhysical Review Letters, 1992
- Quantum cryptography based on Bell’s theoremPhysical Review Letters, 1991
- Communication Theory of Secrecy Systems*Bell System Technical Journal, 1949
- Cipher Printing Telegraph Systems For Secret Wire and Radio Telegraphic CommunicationsTransactions of the American Institute of Electrical Engineers, 1926