Quantum key distribution with realistic states: photon-number statistics in the photon-number splitting attack

نویسندگان

  • Norbert Lütkenhaus
  • Mika Jahma
چکیده

Quantum key distribution can be performed with practical signal sources such as weak coherent pulses. One example of such a scheme is the Bennett–Brassard protocol that can be implemented via polarization of the signals, or equivalent signals. It turns out that the most powerful tool at the disposition of an eavesdropper is the photon-number splitting attack. We show that this attack can be extended in the relevant parameter regime so as to preserve the Poissonian photon number distribution of the combination of the signal source and the lossy channel.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security Analysis of the Multi-photon Three-stage Quantum Key Distribution

This paper presents a multi-stage, multi-photon quantum key distribution protocol based on the double-lock cryptography. It exploits the asymmetry in the detection strategies between the legitimate users and the eavesdropper. The security analysis of the protocol is presented with coherent states under the interceptresend attack, the photon number splitting attack, and the man-in-the-middle att...

متن کامل

Quantum Flows for Secret Key Distribution in the Presence of the Photon Number Splitting Attack

Physical implementations of quantum key distribution (QKD) protocols, like the Bennett-Brassard (BB84), are forced to use attenuated coherent quantum states, because the sources of single photon states are not functional yet for QKD applications. However, when using attenuated coherent states, the relatively high rate of multi-photonic pulses introduces vulnerabilities that can be exploited by ...

متن کامل

A decoy-state protocol for quantum cryptography with 4 intensities of coherent light

In order to beat any type of photon-number-splitting attack, we propose a protocol for quantum key distributoin (QKD) using 4 different intensities of pulses. They are vacuum and coherent states with mean photon number μ, μ and μs. μs is around 0.55 and this class of pulses are used as the main signal states. The other two classes of coherent states are used for both decoy and signal. We have s...

متن کامل

Photon-Number-Splitting-attack resistant Quantum Key Distribution Protocols without sifting

HAL is a multi-disciplinary open access archive for the deposit and dissemination of scientific research documents, whether they are published or not. The documents may come from teaching and research institutions in France or abroad, or from public or private research centers. L’archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau...

متن کامل

Photon-number-solving Decoy State Quantum Key Distribution

Yong-gang Tan and Qing-yu Cai1∗ State Key Laboratory of Magnetic Resonance and Atomic and Molecular Physics, Wuhan Institute of Physics and Mathematics, the Chinese Academy of Sciences, Wuhan ,430071, China and Graduation University of the Chinese Academy of Sciences, Beijing 10081, China Abstract Practical photon sources are weak coherent sources so that multiphoton pulses are inevitable. In o...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002