advertisement
Science News
from research organizations

Better safeguards for sensitive information

Study improves the lower boundary and secret key capacity of an encryption channel

Date:
January 28, 2019
Source:
Springer
Summary:
Despite being the most advanced quantum technology, secure encryption of information units based on a method called quantum key distribution (QKD) is currently limited by the channel's capacity to send or share secret bits. Scientists now show how to better approach the secret key capacity by improving the channel's lower boundary.
Share:
advertisement

FULL STORY

Despite being the most advanced quantum technology, secure encryption of information units based on a method called quantum key distribution (QKD) is currently limited by the channel's capacity to send or share secret bits. In a recent study published inEPJ D, Gan Wang, who is affiliated with both Peking University, Bejing, China, and the University of York, UK, and colleagues show how to better approach the secret key capacity by improving the channel's lower boundary.

The secure encryption of information units based on a method called quantum key distribution (QKD) involves distributing secret keys between two parties -- namely, Alice, the sender, and Bob, the receiver -- by using quantum systems as information carriers. However, the most advanced quantum technology, QKD, is currently limited by the channel's capacity to send or share secret bits. In a recent study published in EPJ D, Gan Wang, who is affiliated with both Peking University, Bejing, China, and the University of York, UK, and colleagues show how to better approach the secret key capacity by improving the channel's lower boundary.

The first stage of a QKD transmission is monitored by an eavesdropper, named Eve, as Alice and Bob share a raw key. However, Eve does not have access to a perfect copy of the signals sent by Alice due to quantum rules. During the second stage, Alice and Bob follow classical protocols involving the correction of errors and enhancement of privacy levels. Thus, Alice and Bob share a complete secret key that can later be used to send confidential messages.

The authors focus on a particular type of channel, called the noisy thermal amplifier channel, where the input signals are amplified together with noise induced by the thermal environment. The authors calculate the highest-known amount of secret information units, or bits, that Alice and Bob can share via such a channel. This is done by injecting controlled noise -- made up of well-defined thermal agitation -- into the detection apparatuses. By optimizing over this noise, they improve the lower boundary of the capacity in the amplifier channel. The authors also confirm that the distribution of secret keys over this channel may occur at higher rates than the transmission of quantum information itself.

advertisement

Story Source:

Materialsprovided bySpringer.注:内容可以编辑for style and length.


Journal Reference:

  1. Gan Wang, Carlo Ottaviani, Hong Guo, Stefano Pirandola.Improving the lower bound to the secret-key capacity of the thermal amplifier channel.The European Physical Journal D, 2019; 73 (1) DOI:10.1140/epjd/e2018-90351-0

Cite This Page:

施普林格。“对敏感informa提供更好的保护tion: Study improves the lower boundary and secret key capacity of an encryption channel." ScienceDaily. ScienceDaily, 28 January 2019. .
施普林格。(2019, January 28). Better safeguards for sensitive information: Study improves the lower boundary and secret key capacity of an encryption channel.ScienceDaily. Retrieved August 3, 2023 from www.koonmotors.com/releases/2019/01/190128101106.htm
施普林格。“对敏感informa提供更好的保护tion: Study improves the lower boundary and secret key capacity of an encryption channel." ScienceDaily. www.koonmotors.com/releases/2019/01/190128101106.htm (accessed August 3, 2023).

Explore More
from ScienceDaily

RELATED STORIES