Photon-monitoring attack on continuous-variable quantum key distribution with source in middle

被引:0
作者
Yijun Wang
Peng Huang
Ying Guo
Dazu Huang
机构
[1] Central South University,School of Information Science and Engineering
[2] University of New South Wales at Australian Defence Force Academy,School of Engineering and Information Technology
[3] Hunan Normal University,School of Physics and Information Science
[4] Hunan University of Finance and Economics,Department of Information Management
来源
Quantum Information Processing | 2014年 / 13卷
关键词
Entanglement; Gaussian state; Continuous-variable ; Quantum key distribution; Quantum communications; Quantum information;
D O I
暂无
中图分类号
学科分类号
摘要
Motivated by a fact that the non-Gaussian operation may increase entanglement of an entangled system, we suggest a photon-monitoring attack strategy in the entanglement-based (EB) continuous-variable quantum key distribution (CVQKD) using the photon subtraction operations, where the entangled source originates from the center instead of one of the legal participants. It shows that an eavesdropper, Eve, can steal large information from participants after intercepting the partial beams with the photon-monitoring attach strategy. The structure of the proposed CVQKD protocol is useful in simply analyzing how quantum loss in imperfect channels can decrease the performance of the CVQKD protocol. The proposed attack strategy can be implemented under current technology, where a newly developed and versatile no-Gaussian operation can be well employed with the entangled source in middle in order to access to mass information in the EB CVQKD protocol, as well as in the prepare-and-measure (PM) CVQKD protocol.
引用
收藏
页码:2745 / 2757
页数:12
相关论文
共 96 条
  • [1] Scarani V(2009)The security of practical quantum key distribution Rev. Mod. Phys. 81 1301-undefined
  • [2] Bechmann-Pasquinucci H(2012)Gaussian quantum information Rev. Mod. Phys. 84 621-undefined
  • [3] Cerf NJ(2003)Virtual entanglement and reconciliation protocols for quantum cryptography with continuous variables Nature 421 238-undefined
  • [4] Dusek M(2006)Unconditional optimality of Gaussian attacks against continuous-variable quantum key distribution Phys. Rev. Lett. 97 190503-undefined
  • [5] Lutkenhaus N(2006)Optimality of Gaussian attacks in continuous-variable quantum cryptography Phys. Rev. Lett. 97 190502-undefined
  • [6] Peev M(2009)de Finetti representation theorem for infinite-dimensional quantum systems and applications to quantum cryptography Phys. Rev. Lett. 102 110504-undefined
  • [7] Weedbrook C(2002)Continuous variable quantum cryptography using coherent states Phys. Rev. Lett. 88 057902-undefined
  • [8] Pirandola S(2012)Continuous variable quantum key distribution: finite-key analysis of composable security against coherent attacks Phys. Rev. Lett. 109 100502-undefined
  • [9] Garcáa-Patrón R(2004)Quantum cryptography without switching Phys. Rev. Lett. 93 170504-undefined
  • [10] Cerf NJ(2013)Security of continuous-variable quantum key distribution against general attacks Phys. Rev. Lett. 110 030502-undefined