Distinguishability and Disturbance in the Quantum Key Distribution Protocol Using the Mean Multi-Kings' Problem.

Entropy (Basel)

Faculty of Science and Engineering, Doshisha University, 1-3 Kyotanabe-shi, Kyoto 610-0394, Japan.

Published: November 2020

We introduce a quantum key distribution protocol using mean multi-kings' problem. Using this protocol, a sender can share a bit sequence as a secret key with receivers. We consider a relation between information gain by an eavesdropper and disturbance contained in legitimate users' information. In BB84 protocol, such relation is known as the so-called information disturbance theorem. We focus on a setting that the sender and two receivers try to share bit sequences and the eavesdropper tries to extract information by interacting legitimate users' systems and an ancilla system. We derive trade-off inequalities between distinguishability of quantum states corresponding to the bit sequence for the eavesdropper and error probability of the bit sequence shared with the legitimate users. Our inequalities show that eavesdropper's extracting information regarding the secret keys inevitably induces disturbing the states and increasing the error probability.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC7712272PMC
http://dx.doi.org/10.3390/e22111275DOI Listing

Publication Analysis

Top Keywords

bit sequence
12
quantum key
8
key distribution
8
distribution protocol
8
protocol multi-kings'
8
multi-kings' problem
8
share bit
8
legitimate users'
8
error probability
8
distinguishability disturbance
4

Similar Publications

Proteoform Identification and Quantification Based on Alignment Graphs.

Bioinformatics

January 2025

Department of Computer Science, City University of Hong Kong, Hong Kong, China.

Motivation: Proteoforms are the different forms of a proteins generated from the genome with various sequence variations, splice isoforms, and post-translational modifications. Proteoforms regulate protein structures and functions. A single protein can have multiple proteoforms due to different modification sites.

View Article and Find Full Text PDF

With ongoing social progress, three-dimensional (3D) video is becoming increasingly prevalent in everyday life. As a key component of 3D video technology, depth video plays a crucial role by providing information about the distance and spatial distribution of objects within a scene. This study focuses on deep video encoding and proposes an efficient encoding method that integrates the Convolutional Neural Network (CNN) with a hyperautomation mechanism.

View Article and Find Full Text PDF

This study presents a novel algorithm for protocol reverse analysis of EtherCAT. The algorithm combines sequence alignment and the Pearson correlation coefficient. We utilize value distribution statistics and the bit flip rate algorithm to effectively partition the protocol fields.

View Article and Find Full Text PDF

Federated Learning: Breaking Down Barriers in Global Genomic Research.

Genes (Basel)

December 2024

Genomic Medicine Laboratory UILDM, IRCCS Santa Lucia Foundation, 00179 Rome, Italy.

Recent advancements in Next-Generation Sequencing (NGS) technologies have revolutionized genomic research, presenting unprecedented opportunities for personalized medicine and population genetics. However, issues such as data silos, privacy concerns, and regulatory challenges hinder large-scale data integration and collaboration. Federated Learning (FL) has emerged as a transformative solution, enabling decentralized data analysis while preserving privacy and complying with regulations such as the General Data Protection Regulation (GDPR).

View Article and Find Full Text PDF

In the era of the Internet of Things (IoT), the transmission of medical reports in the form of scan images for collaborative diagnosis is vital for any telemedicine network. In this context, ensuring secure transmission and communication is necessary to protect medical data to maintain privacy. To address such privacy concerns and secure medical images against cyberattacks, this research presents a robust hybrid encryption framework that integrates quantum, and classical cryptographic methods.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!