Analysis of coherent quantum cryptography protocol vulnerability to an active beam-splitting attack

نویسندگان

  • D. A. Kronberg
  • E. O. Kiktenko
  • A. K. Fedorov
  • Y. V. Kurochkin
چکیده

D.A. Kronberg, 2 E.O. Kiktenko, 4 A.K. Fedorov, 6, 7 and Y.V. Kurochkin Steklov Mathematical Institute of Russian Academy of Sciences, Moscow 119991, Russia Faculty of Computational Mathematics and Cybernetics, Moscow State University, Moscow 119899, Russia Theoretical Department, DEPHAN, Skolkovo, Moscow 143025, Russia Bauman Moscow State Technical University, Moscow 105005, Russia Russian Quantum Center, Skolkovo, Moscow 143025, Russia Acronis Ltd, Moscow 127566, Russia LPTMS, CNRS, Univ. Paris-Sud, Université Paris-Saclay, Orsay 91405, France (Dated: July 18, 2017)

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Zero-error attacks and detection statistics in the coherent one-way protocol for quantum cryptography

This is a study of the security of the Coherent One-Way (COW) protocol for quantum cryptography, proposed recently as a simple and fast experimental scheme. In the zero-error regime, the eavesdropper Eve can only take advantage of the losses in the transmission. We consider new attacks, based on unambiguous state discrimination, which perform better than the basic beam-splitting attack, but whi...

متن کامل

Security Analysis of the Multi-photon Three-stage Quantum Key Distribution

This paper presents a multi-stage, multi-photon quantum key distribution protocol based on the double-lock cryptography. It exploits the asymmetry in the detection strategies between the legitimate users and the eavesdropper. The security analysis of the protocol is presented with coherent states under the interceptresend attack, the photon number splitting attack, and the man-in-the-middle att...

متن کامل

A decoy-state protocol for quantum cryptography with 4 intensities of coherent light

In order to beat any type of photon-number-splitting attack, we propose a protocol for quantum key distributoin (QKD) using 4 different intensities of pulses. They are vacuum and coherent states with mean photon number μ, μ and μs. μs is around 0.55 and this class of pulses are used as the main signal states. The other two classes of coherent states are used for both decoy and signal. We have s...

متن کامل

Practical limitation for continuous-variable quantum cryptography using coherent States.

In this Letter, first, we investigate the security of a continuous-variable quantum cryptographic scheme with a postselection process against individual beam splitting attack. It is shown that the scheme can be secure in the presence of the transmission loss owing to the postselection. Second, we provide a loss limit for continuous-variable quantum cryptography using coherent states taking into...

متن کامل

Quantum Key Distribution with Multi Letter Phase-Shift Keying

We present a new protocol for quantum key distribution using discrete phase-shift encoding with continuous variables. The novelty of the protocol is multi letter alphabets represented by coherent states of light with fixed amplitude and variable phase. Information is encoded in the phase of a coherent states which can be chosen from a regular discrete set consisting of an arbitrary number of le...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016