Explicit attacks on the Bennett-Brassard 1984 protocol with partially distinguishable photons
نویسندگان
چکیده
Distinguishability of photons in non-operational degrees freedom compromises unconditional security quantum key distribution since an eavesdropper can improve attack strategies by exploiting this distinguishability. However, the optimal eavesdropping presence light source side channels are not known. Here we provide several explicit on BB84 protocol with partially distinguishable photons. In particular, consider phase-covariant cloning attack, which is absence channels, and show that there even better channels. The improved exploit a measurement channel state followed signal photon. Our results explicitly demonstrate reduction critical error rate, set upper bound practical secret rate.
منابع مشابه
Shor-Preskill-type security proof for concatenated Bennett-Brassard 1984 quantum-key-distribution protocol
Won-Young Hwang,* Keiji Matsumoto, Hiroshi Imai, Jaewan Kim, and Hai-Woong Lee IMAI Quantum Computation and Information Project, ERATO, Japan Science and Technology Corporation, Daini Hongo White Building 201, 5-28-3, Hongo, Bunkyo, Tokyo 133-0033, Japan School of Computational Sciences, Korea Institute for Advanced Study, Seoul 130-012, Korea Department of Physics, Korea Advanced Institute of ...
متن کاملSecurity of the Bennett-Brassard Quantum Key Distribution Protocol against Collective Attacks
The theoretical Quantum Key-Distribution scheme of Bennett and Brassard (BB84) has been proven secure against very strong attacks including the collective attacks and the joint attacks. Though the latter are the most general attacks, collective attacks are much easier to analyze, yet, they are conjectured to be as informative to the eavesdropper. Thus, collective attacks are likely to be useful...
متن کاملPractical quantum private query of blocks based on unbalanced-state Bennett-Brassard-1984 quantum-key-distribution protocol
Until now, the only kind of practical quantum private query (QPQ), quantum-key-distribution (QKD)-based QPQ, focuses on the retrieval of a single bit. In fact, meaningful message is generally composed of multiple adjacent bits (i.e., a multi-bit block). To obtain a message a1a2···al from database, the user Alice has to query l times to get each ai. In this condition, the server Bob could gain A...
متن کاملOptimal Experimental Scheme for Bennett-Brassard 1984 Quantum Key Distribution Protocol with Weak Coherent Sources, Noisy and Lossy Channel
It is the first scheme which allows the detection apparatus to achieve both the photon number of arriving signals and quantum bit error rate of the multiphoton pulses precisely. We show that the upper bound of the fraction of the tagged multiphoton pulses counts is μ, which is independent of the channel loss and the intensity of the decoy source. Such upper bound is inherent and cannot be reduc...
متن کاملStructured codes improve the Bennett-Brassard-84 quantum key rate.
A central goal in information theory and cryptography is finding simple characterizations of optimal communication rates under various restrictions and security requirements. Ideally, the optimal key rate for a quantum key distribution (QKD) protocol would be given by a single-letter formula involving optimization over a single use of an effective channel. We explore the possibility of such a f...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Physical Review A
سال: 2022
ISSN: ['1538-4446', '1050-2947', '1094-1622']
DOI: https://doi.org/10.1103/physreva.106.042403