Academia.eduAcademia.edu

Experimental Eavesdropping Based on Optimal Quantum Cloning

2013, Physical Review Letters

Abstract

The security of quantum cryptography is guaranteed by the no-cloning theorem, which implies that an eavesdropper copying transmitted qubits in unknown states causes their disturbance. Nevertheless, in real cryptographic systems some level of disturbance has to be allowed to cover, e.g., transmission losses in waveguides. An eavesdropper can attack such systems by replacing a noisy waveguide by a better one and by performing approximate cloning of transmitted qubits which disturb them but below the noise level assumed by legitimate users. We experimentally demonstrate such symmetric individual eavesdropping on the quantum key distribution protocols of Bennett and Brassard (BB84) and the trine-state spherical code of Renes (R04) with two-level probes prepared using a recently developed photonic multifunctional quantum cloner [Phys. Rev. A 85, 050307(R) (2012)]. We studied the influence of the probe on the secret-key rate and quantum bit-error rate (QBER), and discussed the feasibility of such attacks in realistic conditions. We optimize cloning such that the orthogonal von Neumann measurements of the eavesdropper prevent legitime users from distilling a secret key from their raw key bits at the lowest QBER. We established a new security QBER bound for the cloning attacks to be performed on R04 to be 16.7%. We also showed that the same QBER bound for BB84 can be reached with our two-level probe. Thus, we experimentally demonstrated that our optimal cloning device with high-success rate makes the eavesdropping possible by hiding it in usual transmission losses. We believe that this experiment can stimulate the quest for other operational applications of quantum cloning.