Efficient Computational Information Geometric Analysis of Physically Allowed Quantum Cloning Attacks for Quantum Key Distribution Protocols

نویسندگان

  • LASZLO GYONGYOSI
  • SANDOR IMRE
چکیده

In secret quantum communications the best eavesdropping attacks on quantum cryptography are based on imperfect cloning machines. The incoherent attack, based on quantum cloning, is the most common eavesdropping strategy. Using a probe, the eavesdropper imperfectly clones the sender’s quantum state which keeps one copy and sends the other. The physically allowed transformations of Eve’s quantum cloner on Bob’s qubit can be described in terms of Completely Positive (CP), trace preserving maps. The map of the quantum cloner compresses the Bloch-ball, as an affine map. This affine map has to be a complete positive, trace preserving map, which shrinks the Bloch ball. The effects of a quantum cloner can be given in tetrahedron representation. In this paper we show a new, quantum information theoretical representation of eavesdropping detection, focused on the Four-state (BB84) and Six-state quantum cryptography protocols. We use a fundamentally new computational geometrical method to analyze the informational theoretical impacts of cloning activity on the quantum channel. The proposed algorithm uses Delaunay tessellation and convex hull calculation on the Bloch sphere, with respect to quantum relative entropy as distance measure. The improved core-set approach can be used to analyze efficiently the informational theoretical impacts of physically allowed quantum cloning attacks. Key-Words: Quantum Cryptography, Quantum Cloning, Quantum Informational Distance

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Computational Geometric Analysis of Physically Allowed Quantum Cloning Transformations for Quantum Cryptography

The safety of quantum cryptography relies on the no-cloning theorem. In secret quantum communications, an eavesdropper cannot clone the sent qubits perfectly, however the best eavesdropping attacks for quantum cryptography are based on imperfect cloning machines. The eavesdropper’s physically allowed quantum evolutions on the sent qubit can be described in terms of the quantum state’s geometry....

متن کامل

Restricted attacks on semi-quantum key distribution protocols

In this paper, we investigate single state, semi-quantum key distribution protocols. These are protocols whereby one party is limited to measuring only in the computational basis, while the other, though capable of measuring in both computational and Hadamard bases, is limited to preparing and sending only a single, publicly known qubit state. Such protocols rely necessarily on a two-way quantu...

متن کامل

Fe b 20 03 Security of Quantum Key Distribution with entangled qu N its

In this paper we consider a generalisation of Ekert’s entanglement-based quantum cryptographic protocol where qubits are replaced by quN its (i.e., N -dimensional systems). In order to study its robustness against optimal incoherent attacks, we derive the information gained by a potential eavesdropper during a cloning-based individual attack. For doing so, we generalize Cerf’s formalism for clo...

متن کامل

Quantum cloning and key distribution with continuous variables

Quantum information with continuous variables is a paradigm which has attracted a growing interest lately, as a consequence of the prospect for high-rate quantum communication systems that may result from the use of standard telecommunication components. After introducing the concept of quantum continuous variables in optics, we turn to the fundamental impossibility of cloning continuous-variab...

متن کامل

Information geometric security analysis of differential phase-shift quantum key distribution protocol

This paper analyzes the information-theoretical security of the Differential Phase Shift (DPS) Quantum Key Distribution (QKD) protocol, using efficient computational information geometric algorithms. The DPS QKD protocol was introduced for practical reasons, since the earlier QKD schemes were too complicated to implement in practice. The DPS QKD protocol can be an integrated part of current net...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010