New! Sign up for our free email newsletter.
Science News
from research organizations

Better safeguards for sensitive information

Study improves the lower boundary and secret key capacity of an encryption channel

Date:
January 28, 2019
Source:
Springer
Summary:
Despite being the most advanced quantum technology, secure encryption of information units based on a method called quantum key distribution (QKD) is currently limited by the channel's capacity to send or share secret bits. Scientists now show how to better approach the secret key capacity by improving the channel's lower boundary.
Share:
FULL STORY

Despite being the most advanced quantum technology, secure encryption of information units based on a method called quantum key distribution (QKD) is currently limited by the channel's capacity to send or share secret bits. In a recent study published in EPJ D, Gan Wang, who is affiliated with both Peking University, Bejing, China, and the University of York, UK, and colleagues show how to better approach the secret key capacity by improving the channel's lower boundary.

The secure encryption of information units based on a method called quantum key distribution (QKD) involves distributing secret keys between two parties -- namely, Alice, the sender, and Bob, the receiver -- by using quantum systems as information carriers. However, the most advanced quantum technology, QKD, is currently limited by the channel's capacity to send or share secret bits. In a recent study published in EPJ D, Gan Wang, who is affiliated with both Peking University, Bejing, China, and the University of York, UK, and colleagues show how to better approach the secret key capacity by improving the channel's lower boundary.

The first stage of a QKD transmission is monitored by an eavesdropper, named Eve, as Alice and Bob share a raw key. However, Eve does not have access to a perfect copy of the signals sent by Alice due to quantum rules. During the second stage, Alice and Bob follow classical protocols involving the correction of errors and enhancement of privacy levels. Thus, Alice and Bob share a complete secret key that can later be used to send confidential messages.

The authors focus on a particular type of channel, called the noisy thermal amplifier channel, where the input signals are amplified together with noise induced by the thermal environment. The authors calculate the highest-known amount of secret information units, or bits, that Alice and Bob can share via such a channel. This is done by injecting controlled noise -- made up of well-defined thermal agitation -- into the detection apparatuses. By optimizing over this noise, they improve the lower boundary of the capacity in the amplifier channel. The authors also confirm that the distribution of secret keys over this channel may occur at higher rates than the transmission of quantum information itself.


Story Source:

Materials provided by Springer. Note: Content may be edited for style and length.


Journal Reference:

  1. Gan Wang, Carlo Ottaviani, Hong Guo, Stefano Pirandola. Improving the lower bound to the secret-key capacity of the thermal amplifier channel. The European Physical Journal D, 2019; 73 (1) DOI: 10.1140/epjd/e2018-90351-0

Cite This Page:

Springer. "Better safeguards for sensitive information." ScienceDaily. ScienceDaily, 28 January 2019. <www.sciencedaily.com/releases/2019/01/190128101106.htm>.
Springer. (2019, January 28). Better safeguards for sensitive information. ScienceDaily. Retrieved December 21, 2024 from www.sciencedaily.com/releases/2019/01/190128101106.htm
Springer. "Better safeguards for sensitive information." ScienceDaily. www.sciencedaily.com/releases/2019/01/190128101106.htm (accessed December 21, 2024).

Explore More

from ScienceDaily

RELATED STORIES