Direkt zum Inhalt
Symbolfoto: Das AIT ist Österreichs größte außeruniversitäre Forschungseinrichtung

Best Paper Award at "ICQNM 2014 - The Eighth International Conference on Quantum, Nano/Bio, and Micro Technologies"

27.01.2015
AIT expert awarded for outstanding paper in the field of Environmental and Crisis & Disaster Management

Stefan Schauer and Martin Suda are researchers at the group "Optical Quantum Technologies" at AIT Digital Safety & Security Department. For their outstanding paper on "Optimal Choice of Basis Transformations for Entanglement Swapping Based QKD Protocols" they got awarded with the Best Paper Award by an international comitee at "The Eighth International Conference on Quantum, Nano/Bio, and Micro Technologies", which took place from 16th to 20th of November in Lisboa, Portugal.

Our experts also were invited to publish an extended version of the paper in the "International Journal On Advances in Systems and Measurements".

Paper abstract
In this article, we discuss the optimality of basis transformations as a security measure for quantum key distribution protocols based on entanglement swapping. To estimate the security, we focus on the information an adversary obtains on the raw key bits from a generic version of a collective attack strategy. In the scenario described in this article, the application of general basis transformations serving as a counter measure by one or both legitimate parties is analyzed. In this context, we show that the angles, which describe these basis transformations, can be optimized compared to the application of a Hadamard operation, which is the standard basis transformation recurrently found in literature. As a main result, we show that the adversary’s information can be reduced to an amount of I_AE~ 0.20752 when using a single basis transformation and to an amount of I_AE~ 0.0548 when combining two different basis transformations. This is less than half the information compared to other protocols using a Hadamard operation and thus represents an advantage regarding the security of entanglement swapping based protocols.

Furher information