Abstract
Many quantum key distribution QKD analyses examine the link security in a subset of the full Hilbert space that is available to describe the system. In reality, information about the photon state can be embedded in correlations between the polarization space and other dimensions of the full Hilbert space in such a way that Eve can determine the polarization of a photon without affecting it. This paper uses the concept of suitability Hockney et al . "Suitability versus Fidelity for Rating Single Photon Guns" to quantify the available information for Eve to exploit, and demonstrate how it is possible for Alice and Bob to fool themselves into thinking they have a highly secure link.
- 1. G. M. Hockney, P. Kok, and J. P. Dowling, Suitability Versus Fidelity for Rating Single-Photon Guns, arXiv:quant-ph/0206198.Google Scholar
- 2. C. H. Bennett and G. Brassard, in Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing , New York, December 10-12, 1984, pp. 175- 179; C. H. Bennett and G. Brassard, IBM Tech. Disclosure Bull. 28 , 3153-3163 (1985).Google Scholar
- 3. A. Muller, J. Breguet, and N. Gisin, Europhysics Lett. 23 , 383-388 (1993).Google ScholarCross Ref
- 4. J. Breguet, A. Muller, and N. Gisin, J. Modern Optics 41 , 2405-2412 (1994).Google ScholarCross Ref
- 5. A. Muller, H. Zbinden, and N. Gisin, Nature 378 , 449-449 (1995).Google ScholarCross Ref
- 6. C. H. Bennett, Phys. Rev. Lett. 68 , 3121-3124 (1992).Google ScholarCross Ref
- 7. P. Townsend, J. G. Rarity, and P. R. Tapster, Electron. Lett. 29 , 634-639 (1993); P. Townsend, J. Rarity, and P. Tapster, Electron. Lett. 29 , 1291-2193 (1993).Google ScholarCross Ref
- 8. R. Hughes, G. G. Luther, G. L. Morgan, and C. Simmons, Lect. Notes Comput. Sci. 1109 , 329-342 (1996); R. Hughes, G. Morgan, and C. Peterson, J. Modern Opt. 47 , 533- 547; R. Hughes, G. Morgan, and C. Peterson, J. Modern Optics 47 , 533-547 (2000).Google ScholarCross Ref
- 9. J. Breguet and N. Gisin, Optics Lett. 20 , 1447-1449 (1995).Google ScholarCross Ref
- 10. Y. Mazurenko, R. Giust, and J. P. Goedgebuer, Opt. Commun. 133 , 87-92 (1997).Google ScholarCross Ref
- 11. P. C. Sun, Y. Mazurenko, and Y. Fainman, Opt. Lett. 20 , 1062-1063 (1995).Google ScholarCross Ref
- 12. S. N. Molotkov, J. Exp. Theor. Phys. 87 , 288-293 (1998).Google ScholarCross Ref
- 13. T. Jennewein, U. Achleitner, G. Weihs, H. Weinfurter, and A. Zeilinger, Rev. Sci. Inst. 71 , 1675-1680 (2000); quant-ph/9912118.Google ScholarCross Ref
- 14. D. Naik, C. Peterson, A. White, A. Berglund, and P. Kwiat, Phys. Rev. Lett. 84 , 4733- 4736 (2000).Google ScholarCross Ref
- 15. J. D. Franson, Phys. Rev. Lett. 62 , 2205-2208 (1989).Google ScholarCross Ref
- 16. G. Ribordy, J. Brendel, J. D. Gautier, N. Gisin, and H. Zbinden, Phys. Rev. A 63 , 012309 (2001).Google ScholarCross Ref
- 17. W. Tittel, J. Brendel, H. Zbinden, and N. Gisin, Phys. Rev. Lett. 84 , 4737-4740 (2000).Google ScholarCross Ref
- 18. D. Mayers and A. Yao, in Proceedings of the 39th IEEE Conference on Foundations of Computer Science (1998); D. Mayers, in Advances in Cryptography: Proceedings of Crypto 96, Lecture notes in Computer Science , vol. 1109, Springer-Verlag, 1996, pp. 343-357. Google Scholar
- 19. N. Lutkenhaus, PRA 59 , 3301 (1999).Google ScholarCross Ref
- 20. G. Gilbert and M. Hamrick, "Practical Quantum Cryptography: A Comprehensive Analysis", arXiv:quant-ph/ 0009027.Google Scholar
- 21. N. Gisin, G. Ribordy, W. Tittel, and H. Zbinden, Rev. Mod. Phys. , 74 , 145-195 (2002).Google ScholarCross Ref
- 22. G. Gilbert and M. Hamrick, Algorithmica 34 , 314-339 (2002).Google ScholarCross Ref
- 23. L. Allen, M. W. Beijersberen, R. J. C. Spreeeuw, and J. P. Woerdman, Phys. Rev. A 45 , 8185 (1992); L. Allen, M. J. Padgett, M. Babiker, Prog. Opt. 39 , 291 (1999).Google ScholarCross Ref
- 24. P. Kok, H. Lee, and J. P. Dowling, arXiv:quant-ph/0202046.Google Scholar
- 25. C. H. Bennett, G. Brassard, C. Crepeau, and U. M. Maurer, IEEE Trans. Inf. Theor. 40 , 1915-1923 (1995). Google ScholarCross Ref
- 26. C. K. Hong, Z. Y. Ou, and L. Mandel, Phys. Rev. Lett. 59 , 2044 (1987).Google ScholarCross Ref
Index Terms
- Securing QKD Links in the Full Hilbert Space
Recommendations
Coherent state quantum key distribution based on entanglement sudden death
A method for quantum key distribution (QKD) using entangled coherent states is discussed which is designed to provide key distribution rates and transmission distances surpassing those of traditional entangled photon pair QKD by exploiting entanglement ...
Performance Analysis for Brandt's Conclusive Entangling Probe
The Fuchs---Peres---Brandt (FPB) probe realizes the most powerful individual attack on Bennett-Brassard 1984 quantum key distribution by means of a single controlled-NOT gate in which Alice's transmitted qubit becomes the control-qubit input, Bob's ...
Fault tolerant quantum key distributions using entanglement swapping of GHZ states over collective-noise channels
This work proposes two fault tolerant quantum key distribution (QKD) protocols. Each of which is robust under one kind of collective noises: collective-dephasing noise and collective-rotation noise, respectively. Due to the use of the entanglement ...
Comments