skip to main content
article

Securing QKD Links in the Full Hilbert Space

Authors Info & Claims
Published:01 February 2005Publication History
Skip Abstract Section

Abstract

Many quantum key distribution QKD analyses examine the link security in a subset of the full Hilbert space that is available to describe the system. In reality, information about the photon state can be embedded in correlations between the polarization space and other dimensions of the full Hilbert space in such a way that Eve can determine the polarization of a photon without affecting it. This paper uses the concept of suitability Hockney et al . "Suitability versus Fidelity for Rating Single Photon Guns" to quantify the available information for Eve to exploit, and demonstrate how it is possible for Alice and Bob to fool themselves into thinking they have a highly secure link.

References

  1. 1. G. M. Hockney, P. Kok, and J. P. Dowling, Suitability Versus Fidelity for Rating Single-Photon Guns, arXiv:quant-ph/0206198.Google ScholarGoogle Scholar
  2. 2. C. H. Bennett and G. Brassard, in Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing , New York, December 10-12, 1984, pp. 175- 179; C. H. Bennett and G. Brassard, IBM Tech. Disclosure Bull. 28 , 3153-3163 (1985).Google ScholarGoogle Scholar
  3. 3. A. Muller, J. Breguet, and N. Gisin, Europhysics Lett. 23 , 383-388 (1993).Google ScholarGoogle ScholarCross RefCross Ref
  4. 4. J. Breguet, A. Muller, and N. Gisin, J. Modern Optics 41 , 2405-2412 (1994).Google ScholarGoogle ScholarCross RefCross Ref
  5. 5. A. Muller, H. Zbinden, and N. Gisin, Nature 378 , 449-449 (1995).Google ScholarGoogle ScholarCross RefCross Ref
  6. 6. C. H. Bennett, Phys. Rev. Lett. 68 , 3121-3124 (1992).Google ScholarGoogle ScholarCross RefCross Ref
  7. 7. P. Townsend, J. G. Rarity, and P. R. Tapster, Electron. Lett. 29 , 634-639 (1993); P. Townsend, J. Rarity, and P. Tapster, Electron. Lett. 29 , 1291-2193 (1993).Google ScholarGoogle ScholarCross RefCross Ref
  8. 8. R. Hughes, G. G. Luther, G. L. Morgan, and C. Simmons, Lect. Notes Comput. Sci. 1109 , 329-342 (1996); R. Hughes, G. Morgan, and C. Peterson, J. Modern Opt. 47 , 533- 547; R. Hughes, G. Morgan, and C. Peterson, J. Modern Optics 47 , 533-547 (2000).Google ScholarGoogle ScholarCross RefCross Ref
  9. 9. J. Breguet and N. Gisin, Optics Lett. 20 , 1447-1449 (1995).Google ScholarGoogle ScholarCross RefCross Ref
  10. 10. Y. Mazurenko, R. Giust, and J. P. Goedgebuer, Opt. Commun. 133 , 87-92 (1997).Google ScholarGoogle ScholarCross RefCross Ref
  11. 11. P. C. Sun, Y. Mazurenko, and Y. Fainman, Opt. Lett. 20 , 1062-1063 (1995).Google ScholarGoogle ScholarCross RefCross Ref
  12. 12. S. N. Molotkov, J. Exp. Theor. Phys. 87 , 288-293 (1998).Google ScholarGoogle ScholarCross RefCross Ref
  13. 13. T. Jennewein, U. Achleitner, G. Weihs, H. Weinfurter, and A. Zeilinger, Rev. Sci. Inst. 71 , 1675-1680 (2000); quant-ph/9912118.Google ScholarGoogle ScholarCross RefCross Ref
  14. 14. D. Naik, C. Peterson, A. White, A. Berglund, and P. Kwiat, Phys. Rev. Lett. 84 , 4733- 4736 (2000).Google ScholarGoogle ScholarCross RefCross Ref
  15. 15. J. D. Franson, Phys. Rev. Lett. 62 , 2205-2208 (1989).Google ScholarGoogle ScholarCross RefCross Ref
  16. 16. G. Ribordy, J. Brendel, J. D. Gautier, N. Gisin, and H. Zbinden, Phys. Rev. A 63 , 012309 (2001).Google ScholarGoogle ScholarCross RefCross Ref
  17. 17. W. Tittel, J. Brendel, H. Zbinden, and N. Gisin, Phys. Rev. Lett. 84 , 4737-4740 (2000).Google ScholarGoogle ScholarCross RefCross Ref
  18. 18. D. Mayers and A. Yao, in Proceedings of the 39th IEEE Conference on Foundations of Computer Science (1998); D. Mayers, in Advances in Cryptography: Proceedings of Crypto 96, Lecture notes in Computer Science , vol. 1109, Springer-Verlag, 1996, pp. 343-357. Google ScholarGoogle Scholar
  19. 19. N. Lutkenhaus, PRA 59 , 3301 (1999).Google ScholarGoogle ScholarCross RefCross Ref
  20. 20. G. Gilbert and M. Hamrick, "Practical Quantum Cryptography: A Comprehensive Analysis", arXiv:quant-ph/ 0009027.Google ScholarGoogle Scholar
  21. 21. N. Gisin, G. Ribordy, W. Tittel, and H. Zbinden, Rev. Mod. Phys. , 74 , 145-195 (2002).Google ScholarGoogle ScholarCross RefCross Ref
  22. 22. G. Gilbert and M. Hamrick, Algorithmica 34 , 314-339 (2002).Google ScholarGoogle ScholarCross RefCross Ref
  23. 23. L. Allen, M. W. Beijersberen, R. J. C. Spreeeuw, and J. P. Woerdman, Phys. Rev. A 45 , 8185 (1992); L. Allen, M. J. Padgett, M. Babiker, Prog. Opt. 39 , 291 (1999).Google ScholarGoogle ScholarCross RefCross Ref
  24. 24. P. Kok, H. Lee, and J. P. Dowling, arXiv:quant-ph/0202046.Google ScholarGoogle Scholar
  25. 25. C. H. Bennett, G. Brassard, C. Crepeau, and U. M. Maurer, IEEE Trans. Inf. Theor. 40 , 1915-1923 (1995). Google ScholarGoogle ScholarCross RefCross Ref
  26. 26. C. K. Hong, Z. Y. Ou, and L. Mandel, Phys. Rev. Lett. 59 , 2044 (1987).Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Securing QKD Links in the Full Hilbert Space

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access