Paper
24 October 2016 Enhancing QKD security with weak measurements
Jacob M. Farinholt, James E. Troupe
Author Affiliations +
Proceedings Volume 9996, Quantum Information Science and Technology II; 99960B (2016) https://doi.org/10.1117/12.2241059
Event: SPIE Security + Defence, 2016, Edinburgh, United Kingdom
Abstract
Publisher’s Note: This paper, originally published on 10/24/2016, was replaced with a corrected/revised version on 11/8/2016. If you downloaded the original PDF but are unable to access the revision, please contact SPIE Digital Library Customer Service for assistance.

In the late 1980s, Aharonov and colleagues developed the notion of a weak measurement of a quantum observable that does not appreciably disturb the system.1, 2 The measurement results are conditioned on both the pre-selected and post-selected state of the quantum system. While any one measurement reveals very little information, by making the same measurement on a large ensemble of identically prepared pre- and post-selected (PPS) states and averaging the results, one may obtain what is known as the weak value of the observable with respect to that PPS ensemble. Recently, weak measurements have been proposed as a method of assessing the security of QKD in the well-known BB84 protocol.3 This weak value augmented QKD protocol (WV-QKD) works by additionally requiring the receiver, Bob, to make a weak measurement of a particular observable prior to his strong measurement. For the subset of measurement results in which Alice and Bob's measurement bases do not agree, the weak measurement results can be used to detect any attempt by an eavesdropper, Eve, to correlate her measurement results with Bob's. Furthermore, the well-known detector blinding attacks, which are known to perfectly correlate Eve's results with Bob's without being caught by conventional BB84 implementations, actually make the eavesdropper more visible in the new WV-QKD protocol. In this paper, we will introduce the WV-QKD protocol and discuss its generalization to the 6-state single qubit protocol. We will discuss the types of weak measurements that are optimal for this protocol, and compare the predicted performance of the 6- and 4-state WV-QKD protocols.
© (2016) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Jacob M. Farinholt and James E. Troupe "Enhancing QKD security with weak measurements", Proc. SPIE 9996, Quantum Information Science and Technology II, 99960B (24 October 2016); https://doi.org/10.1117/12.2241059
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Quantum key distribution

Error analysis

Polarization

Sensors

Quantum communications

Quantum information

Information security

RELATED CONTENT

Causes of bit error and error correction for quantum key...
Proceedings of SPIE (September 03 2019)
Entanglement based free-space quantum key distribution
Proceedings of SPIE (August 12 2008)
Free-space quantum key distribution at night
Proceedings of SPIE (July 06 1998)
Introduction to optical quantum cryptography
Proceedings of SPIE (December 28 2007)

Back to Top