Intensity and State Estimation in Quantum Cryptography
نویسنده
چکیده
This paper describes how the communicating parties can employ intensity and state estimation to detect if the eavesdropper has siphoned off and injected photons in the received communication. This is of relevance in quantum cryptography based on random rotations of photon polarizations. Introduction The paper investigates the use of state and intensity measurements by Alice and Bob to detect the presence of the active eavesdropper and the use of mixed states rather than pure states in the transmission process. This use can be applied to variations of the three-stage quantum cryptography protocols based on random unitary transformations [1]-[6]. Apart from the faked-state attack [7], [8], the main weakness of BB84 protocol is that single photons are not easy to produce, and the duplicate photons can be used by the eavesdropper to reconstruct the key. The attacker can siphon off the photons when they are transferred between Alice and Bob. Moreover, as the photons are siphoned off only at one step, the intensity of the output at the receiver’s end is not affected. There is also the problem of generating single photons [9] as well as lack of availability of single photon detectors. The polarization rotation protocols are based on fundamental cryptographic primitives [10]. The protocol called iAQC [5] is a variant of three-stage in which Alice and Bob track the intensity of the laser beam at each stage making it possible to detect the intruder. But the drawback of iAQC lies in the scenario when Eve removes some photons and replaces them with the same number of photons with different polarization back into the stream where the intensity remains constant. Such siphoning can be done by fiber tapping [11] or using half silvered mirrors if the communication media is free space. In this case the intensity is not changed and hence Eve will not be discovered and the changes in the state will be ascribed to noise. In order to overcome this threat from Eve, an additional step of detecting the state of photons using tomography [12] is
منابع مشابه
Modulation Response and Relative Intensity Noise Spectra in Quantum Cascade Lasers
Static properties, relatively intensity noise and intensity modulation response in quantum cascade lasers (QCLs) studied theoretically in this paper. The present rate equations model consists of three equations for the electrons density in the conduction band and one equation for photons density in cavity length. Two equations were derived to calculate the noise and modulation response. Calcula...
متن کاملNash equilibria in quantum state estimation and cloning games
We apply a generalized quantum game formalism to the phenomena of quantum cloning and quantum state estimation. We find that both phenomena can be usefully viewed as quantum games. We compute the corresponding Nash equilibria and payoffs for both phenomena. Our work also provides a new perspective on quantum cryptography. [email protected] [email protected]
متن کاملQuantum cloning
The impossibility of perfectly copying or cloning an unknown quantum state is one of the basic rules governing the physics of quantum systems. The processes that perform the optimal approximate cloning have been found in many cases. These “quantum cloning machines” are important tools for studying a wide variety of tasks, e.g., state estimation and eavesdropping on quantum cryptography. This pa...
متن کاملInformation-disturbance Tradeoff in Covariant Quantum State Estimation
There exists a precise tradeoff between the amount of information extracted from a quantum measurement and the amount of disturbance caused on the system, analogous to Heisenberg relations holding in the preparation procedure of a quantum state. The study of such a tradeoff is relevant for both foundation and its enormous relevance in practice, in the realm of quantum key distribution and quant...
متن کاملEntanglement and Quantum Cryptography
Quantum cryptography is one of the most important quantum information applications. The present thesis covers several topics on quantum cryptography, such as the security analysis of quantum channels for key distribution protocols and the study of quantum cloning. First, we introduce a general formalism to characterize the cryptographic properties of quantum channels in the realistic scenario w...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/1302.1823 شماره
صفحات -
تاریخ انتشار 2013