Optimal realistic attacks in continuous-variable quantum key distribution

被引:13
作者
Hosseinidehaj, Nedasadat [1 ]
Walk, Nathan [2 ,3 ]
Ralph, Timothy C. [1 ]
机构
[1] Univ Queensland, Sch Math & Phys, Ctr Quantum Computat & Commun Technol, St Lucia, Qld 4072, Australia
[2] Free Univ Berlin, Dahlem Ctr Complex Quantum Syst, D-14195 Berlin, Germany
[3] Univ Oxford, Dept Comp Sci, Wolfson Bldg, Oxford OX1 3QD, England
基金
英国工程与自然科学研究理事会; 欧盟地平线“2020”; 澳大利亚研究理事会;
关键词
SECURITY;
D O I
10.1103/PhysRevA.99.052336
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
Quantum cryptographic protocols are typically analyzed by assuming that potential opponents can carry out all physical operations, an assumption which grants capabilities far in excess of present technology. Adjusting this assumption to reflect more realistic capabilities is an attractive prospect, but one that can only be justified with a rigorous, quantitative framework that relates adversarial restrictions to the protocol's security and performance. We investigate the effect of limitations on the eavesdropper's (Eve's) ability to make a coherent attack on the security of continuous-variable quantum key distribution (CV-QKD). We consider a realistic attack in which the total decoherence induced during the attack is modeled by a Gaussian channel. Based on our decoherence model, we propose an optimal hybrid attack, which allows Eve to perform a combination of both coherent and individual attacks simultaneously. We evaluate the asymptotic and composable finite-size security of a heterodyne CV-QKD protocol against such hybrid attacks in terms of Eve's decoherence. We show that when the decoherence is greater than a threshold value, Eve's most effective strategy is reduced to the individual attack. Thus, if we are willing to assume that the decoherence caused by the memory and the collective measurement is large enough, it is sufficient to analyze the security of the protocol only against individual attacks, which significantly improves the CV-QKD performance in terms of both the key rate and maximum secure transmission distance.
引用
收藏
页数:11
相关论文
共 44 条
[1]  
[Anonymous], 2012, ARXIV PREPRINT ARXIV
[2]   Distributing Secret Keys with Quantum Continuous Variables: Principle, Security and Implementations [J].
Diamanti, Eleni ;
Leverrier, Anthony .
ENTROPY, 2015, 17 (09) :6072-6092
[3]   An experimental implementation of oblivious transfer in the noisy storage model [J].
Erven, C. ;
Ng, N. ;
Gigov, N. ;
Laflamme, R. ;
Wehner, S. ;
Weihs, G. .
NATURE COMMUNICATIONS, 2014, 5
[4]   Improvement of continuous-variable quantum key distribution systems by using optical preamplifiers [J].
Fossier, S. ;
Diamanti, E. ;
Debuisschert, T. ;
Tualle-Brouri, R. ;
Grangier, P. .
JOURNAL OF PHYSICS B-ATOMIC MOLECULAR AND OPTICAL PHYSICS, 2009, 42 (11)
[5]   Continuous Variable Quantum Key Distribution: Finite-Key Analysis of Composable Security against Coherent Attacks [J].
Furrer, F. ;
Franz, T. ;
Berta, M. ;
Leverrier, A. ;
Scholz, V. B. ;
Tomamichel, M. ;
Werner, R. F. .
PHYSICAL REVIEW LETTERS, 2012, 109 (10)
[6]   Continuous-variable protocol for oblivious transfer in the noisy-storage model [J].
Furrer, Fabian ;
Gehring, Tobias ;
Schaffner, Christian ;
Pacher, Christoph ;
Schnabel, Roman ;
Wehner, Stephanie .
NATURE COMMUNICATIONS, 2018, 9
[7]   Reverse-reconciliation continuous-variable quantum key distribution based on the uncertainty principle [J].
Furrer, Fabian .
PHYSICAL REVIEW A, 2014, 90 (04)
[8]  
Garcia-Patron R., 2007, THESIS
[9]   Unconditional optimality of Gaussian attacks against continuous-variable quantum key distribution [J].
Garcia-Patron, Raul ;
Cerf, Nicolas J. .
PHYSICAL REVIEW LETTERS, 2006, 97 (19)
[10]   Continuous-Variable Quantum Key Distribution Protocols Over Noisy Channels [J].
Garcia-Patron, Raul ;
Cerf, Nicolas J. .
PHYSICAL REVIEW LETTERS, 2009, 102 (13)