DeepAI AI Chat
Log In Sign Up

Upper Bound of Collective Attacks on Quantum Key Distribution

by   Wei Li, et al.
Nanjing University of Posts and Telecommunications

Evaluating the theoretical limit of the amount of information Eve can steal from a quantum key distribution protocol under given conditions is one of the most important things that need to be done in security proof. In addition to source loopholes and detection loopholes, channel attacks are considered to be the main ways of information leakage, while collective attacks are considered to be the most powerful active channel attacks. Here we deduce in detail the capability limit of Eve's collective attack in non-entangled quantum key distribution, like BB84 and measurement-device-independent protocols, and entangled quantum key distribution, like device-independent protocol, in which collective attack is composed of quantum weak measurement and quantum unambiguous state discrimination detection. The theoretical results show that collective attacks are equivalent in entangled and non-entangled quantum key distribution protocols. We also find that compared with the security proof based on entanglement purification, the security proof based on collective attack not only improves the system's tolerable bit error rate, but also improves the key rate.


page 1

page 2

page 3

page 4


Security Proof Against Collective Attacks for an Experimentally Feasible Semi-Quantum Key Distribution Protocol

Semi-quantum key distribution (SQKD) allows two parties (Alice and Bob) ...

New protocols for quantum key distribution with explicit upper and lower bound on secret-key rate

Here we present two new schemes for quantum key distribution (QKD) which...

Device-Independent Quantum Key Distribution

Cryptographic key exchange protocols traditionally rely on computational...

Composable Security Against Collective Attacks of a Modified BB84 QKD Protocol with Information only in One Basis

Quantum Cryptography uses the counter-intuitive properties of Quantum Me...

𝒫𝒯-Symmetric Quantum State Discrimination for Attack on BB84 Quantum Key Distribution

Quantum Key Distribution or QKD provides symmetric key distribution usin...

From Practice to Theory: The "Bright Illumination" Attack on Quantum Key Distribution Systems

The "Bright Illumination" attack [Lydersen et al., Nat. Photon. 4, 686-6...

Second-order coding rates for key distillation in quantum key distribution

The security of quantum key distribution has traditionally been analyzed...