Optimal eavesdropping on quantum key distribution without quantum memory

被引:3
|
作者
Bocquet, Aurelien [1 ,2 ]
Alleaume, Romain [1 ,2 ]
Leverrier, Anthony [3 ]
机构
[1] Inst Telecom Telecom ParisTech, F-75013 Paris, France
[2] CNRS LTCI, F-75013 Paris, France
[3] ICFO Inst Ciencies Fotoniques, Castelldefels 08860, Barcelona, Spain
关键词
UNCONDITIONAL SECURITY; CRYPTOGRAPHY; PROOF;
D O I
10.1088/1751-8113/45/2/025305
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
We consider the security of the BB84 (Bennett and Brassard 1984 Proc. IEEE Int. Conf. on Computers, Systems, and Signal Processing pp 175-9), six-state (Bruss 1998 Phys. Rev. Lett. 81 3018) and SARG04 (Scarani et al 2004 Phys. Rev. Lett. 92 057901) quantum key distribution protocols when the eavesdropper does not have access to a quantum memory. In this case, Eve's most general strategy is to measure her ancilla with an appropriate positive operator-valued measure designed to take advantage of the post-measurement information that will be released during the sifting phase of the protocol. After an optimization on all the parameters accessible to Eve, our method provides us with new bounds for the security of six-state and SARG04 against a memoryless adversary. In particular, for the six-state protocol we show that the maximum quantum bit error ratio for which a secure key can be extracted is increased from 12.6% (for collective attacks) to 20.4% with the memoryless assumption.
引用
收藏
页数:10
相关论文
共 50 条
  • [1] OPTIMAL EAVESDROPPING ON NOISY STATES IN QUANTUM KEY DISTRIBUTION
    Shadman, Z.
    Kampermann, H.
    Meyer, T.
    Bruss, D.
    INTERNATIONAL JOURNAL OF QUANTUM INFORMATION, 2009, 7 (01) : 297 - 306
  • [2] Eavesdropping without quantum memory
    Bechmann-Pasquinucci, H
    PHYSICAL REVIEW A, 2006, 73 (04)
  • [3] Conclusive eavesdropping in quantum key distribution
    Brandt, HE
    JOURNAL OF OPTICS B-QUANTUM AND SEMICLASSICAL OPTICS, 2005, 7 (12) : S553 - S556
  • [4] Entangled eavesdropping in quantum key distribution
    Brandt, Howard E.
    JOURNAL OF MODERN OPTICS, 2006, 53 (16-17) : 2251 - 2257
  • [5] Quantum circuit for optimal eavesdropping in quantum key distribution using phase-time coding
    Kronberg, D. A.
    Molotkov, S. N.
    JOURNAL OF EXPERIMENTAL AND THEORETICAL PHYSICS, 2010, 111 (01) : 27 - 56
  • [6] Quantum circuit for optimal eavesdropping in quantum key distribution using phase-time coding
    D. A. Kronberg
    S. N. Molotkov
    Journal of Experimental and Theoretical Physics, 2010, 111 : 27 - 56
  • [7] Eavesdropping on counterfactual quantum key distribution with finite resources
    Liu, Xingtong
    Zhang, Bo
    Wang, Jian
    Tang, Chaojing
    Zhao, Jingjing
    Zhang, Sheng
    PHYSICAL REVIEW A, 2014, 90 (02):
  • [8] Quantum key distribution between N partners: Optimal eavesdropping and Bell's inequalities
    Scarani, Valerio
    Gisin, Nicolas
    Physical Review A. Atomic, Molecular, and Optical Physics, 2002, 65 (01): : 123111 - 123118
  • [9] Symmetric collective attacks for the eavesdropping of symmetric quantum key distribution
    Pirandola, Stefano
    INTERNATIONAL JOURNAL OF QUANTUM INFORMATION, 2008, 6 : 765 - 771
  • [10] Eavesdropping a quantum key distribution network using sequential quantum unsharp measurement attacks
    Yash Wath
    M. Hariprasad
    Freya Shah
    Shashank Gupta
    The European Physical Journal Plus, 138