On the Security of Interferometric Quantum Key Distribution

نویسندگان

  • Ran Gelles
  • Tal Mor
چکیده

Many quantum key distribution (QKD) schemes are based on sending and measuring qubits—twodimensional quantum systems. Yet, in practical realizations and experiments, the measuring devices at the receiver’s (Bob) site commonly do not measure a two-dimensional system but rather a quantum space of a larger dimension. Such an enlargement sometimes results from imperfect devices. However, in various QKD protocols such enlargement exists even in the ideal scenario when all devices are assumed to be perfect. This issue is common, for instance, in QKD schemes implemented via photons, where the parties’ devices are based on Mach-Zehnder interferometers, as these inherently enlarge the quantum space in use. We show how space enlargement at Bob’s site exposes the implemented protocol to new kinds of attacks, attacks that have not yet been explicitly pinpointed nor rigorously analyzed. We name these the “reversed space attacks”. A key insight in formalizing our attacks, is the idea of taking all states defining Bob’s (large) measured space and reversing them in time in order to identify precisely the space that an eavesdropper may attack. We employ such attacks on two variants of intereferometric-based QKD recently experimented by several groups, and show how to get full information on the qubit sent by Alice, while inducing no errors at all. The technique we develop here has subsequently been used in a closely related work (Boyer, Gelles, and Mor, Physical Review A, 2014) to demonstrate a (weaker variant of) reversed-space attack on both interferometric-based and polarization-based QKD. a A preliminary version of this manuscript [1] appeared in the Proceeding of the First International Conference on the Theory and Practice of Natural Computing (TPNC12).

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

ua nt - p h / 01 06 08 3 v 1 1 5 Ju n 20 01 ‘ Circular type ’ quantum key distribution

Circular type’ interferometric system for quantum key distribution is proposed. The system has naturally self-alignment and compensation of birefringence and also has enough efficiency against polarisation dependence. Moreover it is easily applicable to multi-party. Key creation with 0.1 photon per pulse at a rate of 1.2KHz with a 5.4% QBER over a 200m fiber was realized. Quantum key distributi...

متن کامل

Quantum Cryptography using larger alphabets

Like all of quantum information theory, quantum cryptography is traditionally based on two level quantum systems. In this letter, a new protocol for quantum key distribution based on higher dimensional systems is presented. An experimental realization using an interferometric setup is also proposed. Analyzing this protocol from the practical side, one finds an increased key creation rate while ...

متن کامل

LPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring

Communication security of wireless sensor networks is achieved using cryptographic keys assigned to the nodes. Due to resource constraints in such networks, random key pre-distribution schemes are of high interest. Although in most of these schemes no location information is considered, there are scenarios that location information can be obtained by nodes after their deployment. In this paper,...

متن کامل

Security of Quantum Key Distribution

We construct a new quantum key distribution scheme and prove its security against the most general type of attacks and the most general type of noises allowed by quantum physics. The novel technique we use is reduction from a quantum scheme to a classical scheme. We first show that, rather surprisingly, the proof of security of our quantum key distribution in the error-free case can be reduced ...

متن کامل

Security of Device-Independent Quantum Key Distribution Protocols

Device-independent cryptography represent the strongest form of physical security: it is based on general physical laws and does not require any detailed knowledge or control of the physical devices used in the protocol. We discuss a general security proof valid for a large class of device-independent quantum key distribution protocols. The proof relies on the validity of Quantum Theory and req...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012