Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2013, Physical Review Letters
…
5 pages
1 file
The security of quantum cryptography is guaranteed by the no-cloning theorem, which implies that an eavesdropper copying transmitted qubits in unknown states causes their disturbance. Nevertheless, in real cryptographic systems some level of disturbance has to be allowed to cover, e.g., transmission losses in waveguides. An eavesdropper can attack such systems by replacing a noisy waveguide by a better one and by performing approximate cloning of transmitted qubits which disturb them but below the noise level assumed by legitimate users. We experimentally demonstrate such symmetric individual eavesdropping on the quantum key distribution protocols of Bennett and Brassard (BB84) and the trine-state spherical code of Renes (R04) with two-level probes prepared using a recently developed photonic multifunctional quantum cloner [Phys. Rev. A 85, 050307(R) (2012)]. We studied the influence of the probe on the secret-key rate and quantum bit-error rate (QBER), and discussed the feasibility of such attacks in realistic conditions. We optimize cloning such that the orthogonal von Neumann measurements of the eavesdropper prevent legitime users from distilling a secret key from their raw key bits at the lowest QBER. We established a new security QBER bound for the cloning attacks to be performed on R04 to be 16.7%. We also showed that the same QBER bound for BB84 can be reached with our two-level probe. Thus, we experimentally demonstrated that our optimal cloning device with high-success rate makes the eavesdropping possible by hiding it in usual transmission losses. We believe that this experiment can stimulate the quest for other operational applications of quantum cloning.
Physics Letters A, 1997
We analyze various eavesdropping strategies on a quantum cryptographic channel. We present the optimal strategy for an eavesdropper restricted to a two-dimensional probe, interacting on-line with each transmitted signal. The link between safety of the transmission and the violation of Bell's inequality is discussed. We also use a quantum copying machine for eavesdropping and for broadcasting quantum information.
Employing the fundamental laws of quantum physics, Quantum Key Distribution (QKD) promises the unconditionally secure distribution of cryptographic keys. However, in practical realisations, a QKD protocol is only secure, when the quantum bit error rate introduced by an eavesdropper unavoidably exceeds the system error rate. This condition guarantees that an eavesdropper cannot disguise his presence by simply replacing the original transmission line with a less faulty one. Unfortunately, this condition also limits the possible distance between the communicating parties, Alice and Bob, to a few hundred kilometers. To overcome this problem, we design a QKD protocol which allows Alice and Bob to distinguish system errors from eavesdropping errors. If they are able to identify the origin of their errors, they can detect eavesdropping even when the system error rate exceeds the eavesdropping error rate. To achieve this, the proposed protocol employs an alternative encoding of information in two-dimensional photon states. Errors manifest themselves as quantum bit and as index transmission errors with a distinct correlation between them in case of intercept-resend eavesdropping. As a result, Alice and Bob can tolerate lower eavesdropping and higher system errors without compromising their privacy.
Sensors
Quantum computing allows the implementation of powerful algorithms with enormous computing capabilities and promises a secure quantum Internet. Despite the advantages brought by quantum communication, certain communication paradigms are impossible or cannot be completely implemented due to the no-cloning theorem. Qubit retransmission for reliable communications and point-to-multipoint quantum communication (QP2MP) are among them. In this paper, we investigate whether a Universal Quantum Copying Machine (UQCM) generating imperfect copies of qubits can help. Specifically, we propose the Quantum Automatic Repeat Request (QARQ) protocol, which is based on its classical variant, as well as to perform QP2MP communication using imperfect clones. Note that the availability of these protocols might foster the development of new distributed quantum computing applications. As current quantum devices are noisy and they decohere qubits, we analyze these two protocols under the presence of variou...
International Journal of Quantum Information, 2009
We study eavesdropping in quantum key distribution with the six state protocol, when the signal states are mixed with white noise. This situation may arise either when Alice deliberately adds noise to the signal states before they leave her lab, or in a realistic scenario where Eve cannot replace the noisy quantum channel by a noiseless one. We find Eve's optimal mutual information with Alice, for individual attacks, as a function of the qubit error rate. Our result is that added quantum noise can make quantum key distribution more robust against eavesdropping.
Journal of Modern Optics, 1994
We analyse the information obtained by an eavesdropper during the various stages of a quantum cryptographic protocol associated with key distribution. We provide both an upper and a lower limit on the amount of information that may have leaked to the eavesdropper at the end of the key distribution procedure. These limits are restricted to intercept/resend eavesdropping strategies. The upper one is higher than has been estimated so far, and should be taken into account in order to guarantee the secrecy of the final key, which is subsequently obtained via the so-called privacy amplification .
2009 Third International Conference on Quantum, Nano and Micro Technologies, 2009
We consider one of the quantum key distribution protocols recently introduced in Ref. [Pirandola et al., Nature Physics 4, 726 (2008)]. This protocol consists in a two-way quantum communication between Alice and Bob, where Alice encodes secret information via a random phase-space displacement of a coherent state. In particular, we study its security against a specific class of individual attacks which are based on combinations of Gaussian quantum cloning machines.
Physical Review A, 1997
We consider the Bennett-Brassard cryptographic scheme, which uses two conjugate quantum bases. An eavesdropper who attempts to obtain information on qubits sent in one of the bases causes a disturbance to qubits sent in the other basis. We derive an upper bound to the accessible information in one basis, for a given error rate in the conjugate basis. Independently fixing the error rate in the conjugate bases, we show that both bounds can be attained simultaneously by an optimal eavesdropping probe, consisting of two qubits. The qubits' interaction and their subsequent measurement are described explicitly. These results are combined to give an expression for the optimal information an eavesdropper can obtain for a given average disturbance when her interaction and measurements are performed signal by signal. Finally, the relation between quantum cryptography and violations of Bell's inequalities is discussed.
Journal of Physics A: Mathematical and Theoretical, 2011
We consider the security of the BB84, six-state and SARG04 quantum key distribution protocols when the eavesdropper doesn't have access to a quantum memory. In this case, Eve's most general strategy is to measure her ancilla with an appropriate POVM designed to take advantage of the post-measurement information that will be released during the sifting phase of the protocol. After an optimization on all the parameters accessible to Eve, our method provides us with new bounds for the security of six-state and SARG04 against a memoryless adversary. In particular, for the six-state protocol we show that the maximum QBER for which a secure key can be extracted is increased from 12.6% (for collective attacks) to 20.4% with the memoryless assumption.
Physical Review A, 2012
We present the first experimental implementation of a multifunctional optimal quantum cloner. Previous implementations have always been designed to optimize the cloning procedure with respect to one single type of a priori information about the cloned state. In contrast, our "all in one" implementation is optimal for several prominent regimes such as universal cloning, phase-covariant cloning and also, the first ever realized mirror phase-covariant cloning, when the square of the expected value of Pauli's Z operator is known in advance. In all these regimes the experimental device yields clones with almost maximum achievable average fidelity (97.5% of theoretical limit). Our device has a wide range of possible applications in quantum information processing especially in quantum communication. For instance, one can use it for incoherent and coherent attacks against a variety of cryptographic protocols including the BB84 protocol of quantum key distribution through the Pauli damping channels. It can be also applied as a state-dependent photon multiplier in practical quantum networks. PACS numbers: 42.50.Ex, 03.67.Lx
Quantum Information Processing, 2014
We demonstrate the possibility of controlling the success probability of a secret sharing protocol using a quantum cloning circuit. The cloning circuit is used to clone the qubits containing the encoded information and en route to the intended receipients. The success probability of the protocol depends on the cloning parameters used to clone the qubits. We also establish a relation between the concurrence of initially prepared state, entanglement of the mixed state received by the receivers after cloning scheme and the cloning parameters of cloning machine. * [email protected]
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.
Physical Review Letters, 2002
Physical Review Applied
IEEE Journal of Selected Topics in Quantum Electronics, 2015
Physical Review A, 2001
Phys Rev a, 2001
Quantum Matter
Physical Review Letters, 2002
Photonic Quantum …, 1997
Physical Review Letters, 2005