Upper Bound of Collective Attacks on Quantum Key Distribution

09/27/2019
by   Wei Li, et al.
0

Evaluating the theoretical limit of the amount of information Eve can steal from a quantum key distribution protocol under given conditions is one of the most important things that need to be done in security proof. In addition to source loopholes and detection loopholes, channel attacks are considered to be the main ways of information leakage, while collective attacks are considered to be the most powerful active channel attacks. Here we deduce in detail the capability limit of Eve's collective attack in non-entangled quantum key distribution, like BB84 and measurement-device-independent protocols, and entangled quantum key distribution, like device-independent protocol, in which collective attack is composed of quantum weak measurement and quantum unambiguous state discrimination detection. The theoretical results show that collective attacks are equivalent in entangled and non-entangled quantum key distribution protocols. We also find that compared with the security proof based on entanglement purification, the security proof based on collective attack not only improves the system's tolerable bit error rate, but also improves the key rate.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/03/2020

Security Proof Against Collective Attacks for an Experimentally Feasible Semi-Quantum Key Distribution Protocol

Semi-quantum key distribution (SQKD) allows two parties (Alice and Bob) ...
research
12/26/2022

New protocols for quantum key distribution with explicit upper and lower bound on secret-key rate

Here we present two new schemes for quantum key distribution (QKD) which...
research
09/29/2021

Device-Independent Quantum Key Distribution

Cryptographic key exchange protocols traditionally rely on computational...
research
11/27/2017

Composable Security Against Collective Attacks of a Modified BB84 QKD Protocol with Information only in One Basis

Quantum Cryptography uses the counter-intuitive properties of Quantum Me...
research
02/20/2021

𝒫𝒯-Symmetric Quantum State Discrimination for Attack on BB84 Quantum Key Distribution

Quantum Key Distribution or QKD provides symmetric key distribution usin...
research
11/04/2020

From Practice to Theory: The "Bright Illumination" Attack on Quantum Key Distribution Systems

The "Bright Illumination" attack [Lydersen et al., Nat. Photon. 4, 686-6...
research
10/09/2019

Second-order coding rates for key distillation in quantum key distribution

The security of quantum key distribution has traditionally been analyzed...

Please sign up or login with your details

Forgot password? Click here to reset