DeepAI AI Chat
Log In Sign Up

Upper Bound of Collective Attacks on Quantum Key Distribution

09/27/2019
by   Wei Li, et al.
Nanjing University of Posts and Telecommunications
0

Evaluating the theoretical limit of the amount of information Eve can steal from a quantum key distribution protocol under given conditions is one of the most important things that need to be done in security proof. In addition to source loopholes and detection loopholes, channel attacks are considered to be the main ways of information leakage, while collective attacks are considered to be the most powerful active channel attacks. Here we deduce in detail the capability limit of Eve's collective attack in non-entangled quantum key distribution, like BB84 and measurement-device-independent protocols, and entangled quantum key distribution, like device-independent protocol, in which collective attack is composed of quantum weak measurement and quantum unambiguous state discrimination detection. The theoretical results show that collective attacks are equivalent in entangled and non-entangled quantum key distribution protocols. We also find that compared with the security proof based on entanglement purification, the security proof based on collective attack not only improves the system's tolerable bit error rate, but also improves the key rate.

READ FULL TEXT

page 1

page 2

page 3

page 4

12/03/2020

Security Proof Against Collective Attacks for an Experimentally Feasible Semi-Quantum Key Distribution Protocol

Semi-quantum key distribution (SQKD) allows two parties (Alice and Bob) ...
12/26/2022

New protocols for quantum key distribution with explicit upper and lower bound on secret-key rate

Here we present two new schemes for quantum key distribution (QKD) which...
09/29/2021

Device-Independent Quantum Key Distribution

Cryptographic key exchange protocols traditionally rely on computational...
11/27/2017

Composable Security Against Collective Attacks of a Modified BB84 QKD Protocol with Information only in One Basis

Quantum Cryptography uses the counter-intuitive properties of Quantum Me...
02/20/2021

𝒫𝒯-Symmetric Quantum State Discrimination for Attack on BB84 Quantum Key Distribution

Quantum Key Distribution or QKD provides symmetric key distribution usin...
11/04/2020

From Practice to Theory: The "Bright Illumination" Attack on Quantum Key Distribution Systems

The "Bright Illumination" attack [Lydersen et al., Nat. Photon. 4, 686-6...
10/09/2019

Second-order coding rates for key distillation in quantum key distribution

The security of quantum key distribution has traditionally been analyzed...