Zero-error attacks and detection statistics in the coherent one-way protocol for quantum cryptography
نویسندگان
چکیده
This is a study of the security of the Coherent One-Way (COW) protocol for quantum cryptography, proposed recently as a simple and fast experimental scheme. In the zero-error regime, the eavesdropper Eve can only take advantage of the losses in the transmission. We consider new attacks, based on unambiguous state discrimination, which perform better than the basic beam-splitting attack, but which can be detected by a careful analysis of the detection statistics. These results stress the importance of testing several statistical parameters in order to achieve higher rates of secret bits.
منابع مشابه
Gaussian two-mode attacks in one-way quantum cryptography
We investigate the asymptotic security of one-way continuous variable quantum key distribution against Gaussian two-mode coherent attacks. The one-way protocol is implemented by arranging the channel uses in two-mode blocks. By applying symmetric random permutations over these blocks, the security analysis is in fact reduced to study two-mode coherent attacks and, in particular, Gaussian ones, ...
متن کاملA Necessary Condition for the Security of Coherent- One-Way Quantum Key Distribution Protocol
The coherent-one-way and the differential-phase-shift protocols are two of the most recent practical quantum key distribution protocols for quantum cryptography. These protocols belong to a class of so-called distributed-phase-reference quantum key distribution protocols. While security proofs for some limited attacks exist, the unconditional security proofs this class of protocol remain unreal...
متن کاملQuantum cryptography as a retrodiction problem.
We propose a quantum key distribution protocol based on a quantum retrodiction protocol, known as the Mean King problem. The protocol uses a two way quantum channel. We show security against coherent attacks in a transmission-error free scenario, even if Eve is allowed to attack both transmissions. This establishes a connection between retrodiction and key distribution.
متن کاملRaw-data Attacks in Quantum Cryptography with Partial Tomography
We consider a variant of the BB84 protocol for quantum cryptography, the prototype of tomographically incomplete protocols, where the key is generated by one-way communication rather than the usual two-way communication. Our analysis, backed by numerical evidence, establishes thresholds for eavesdropping attacks on the raw data and on the generated key at quantum bit error rates of 10% and 6.15...
متن کاملLong Distance Continuous-Variable Quantum Key Distribution with a Gaussian Modulation
We designed high-efficiency error correcting codes allowing to extract an errorless secret key in a Continuous-Variable Quantum Key Distribution (CVQKD) protocol using a Gaussian modulation of coherent states and a homodyne detection. These codes are available for a wide range of signalto-noise ratios on an Additive White Gaussian Noise Channel (AWGNC) with a binary modulation and can be combin...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Quantum Information & Computation
دوره 7 شماره
صفحات -
تاریخ انتشار 2007