메뉴 건너뛰기




Volumn 69, Issue 1, 2004, Pages 16-

Coherent-pulse implementations of quantum cryptography protocols resistant to photon-number-splitting attacks

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84894238003     PISSN: 10502947     EISSN: 10941622     Source Type: Journal    
DOI: 10.1103/PhysRevA.69.012309     Document Type: Article
Times cited : (19)

References (38)
  • 1
    • 85037231636 scopus 로고    scopus 로고
    • C. H. Bennett and G. Brassard, in Proceedings IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India (IEEE, New York, 1984), pp. 175–179
    • C. H. Bennett and G. Brassard, in Proceedings IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India (IEEE, New York, 1984), pp. 175–179.
  • 2
    • 85037193967 scopus 로고    scopus 로고
    • Introduction to Quantum Computation and Information, edited by H. K. Lo, S. Popescu, and T. P. Spiller (World Scientific, Singapore, 1998)
    • Introduction to Quantum Computation and Information, edited by H. K. Lo, S. Popescu, and T. P. Spiller (World Scientific, Singapore, 1998).
  • 5
    • 85037191088 scopus 로고    scopus 로고
    • It is a well-known fact that the existence of a perfect quantum cloning machine would allow to beat Heisenberg’s uncertainty principle
    • It is a well-known fact that the existence of a perfect quantum cloning machine would allow to beat Heisenberg’s uncertainty principle.
  • 16
    • 85037204200 scopus 로고    scopus 로고
    • V. Scarani, A. Acín, N. Gisin, and G. Ribordy, Phys. Rev. Lett. (to be published)
    • V. Scarani, A. Acín, N. Gisin, and G. Ribordy, Phys. Rev. Lett. (to be published).
  • 18
    • 85037195977 scopus 로고    scopus 로고
    • It has been shown in W. Xiang-bin, quant-ph/0110089, that no finite coherent attack is more powerful than the incoherent one when Eve’s measurement takes place before the error correction and privacy amplification process. However his demonstration does not apply to the case of a coherent attack on an infinite number of pulses.
    • Xiang-bin, W.1
  • 22
    • 85037241987 scopus 로고    scopus 로고
    • We take (Formula presented) for all the figures in this paper
    • We take (Formula presented) for all the figures in this paper.
  • 23
    • 85037198254 scopus 로고    scopus 로고
    • We believe that Eve must necessarily have access to Bob’s lab in order to modify his detectors. In contrary to this, one might think that Eve is able to shift the signals she wants to be detected into a wavelength region of higher detector efficiency. But this can be simply avoided by putting a narrow filter before the detector. Or, she can send pulses with large mean photon number whenever she wants the pulse to be detected, but this produces a significant increase of the double counts when Bob chooses the wrong measurement
    • We believe that Eve must necessarily have access to Bob’s lab in order to modify his detectors. In contrary to this, one might think that Eve is able to shift the signals she wants to be detected into a wavelength region of higher detector efficiency. But this can be simply avoided by putting a narrow filter before the detector. Or, she can send pulses with large mean photon number whenever she wants the pulse to be detected, but this produces a significant increase of the double counts when Bob chooses the wrong measurement.
  • 24
    • 85037237640 scopus 로고    scopus 로고
    • all of the article, we take as the computational basis, |0〉 and |1〉, the eigenvectors of (Formula presented) with eigenvalues ±1
    • In all of the article, we take as the computational basis, |0〉 and |1〉, the eigenvectors of (Formula presented) with eigenvalues ±1.
  • 25
    • 85037197116 scopus 로고    scopus 로고
    • A. Peres, Quantum Theory: Concepts and Methods (Kluwer, Dordrecht, 1998), Sec. 9-5
    • A. Peres, Quantum Theory: Concepts and Methods (Kluwer, Dordrecht, 1998), Sec. 9-5.
  • 27
    • 85037213712 scopus 로고    scopus 로고
    • C. W. Helstrom, Quantum Detection and Estimation Theory (Academic, New York, 1976)
    • C. W. Helstrom, Quantum Detection and Estimation Theory (Academic, New York, 1976).
  • 30
    • 85037239600 scopus 로고    scopus 로고
    • The optimal generalized measurement of Eq. (28) in (Formula presented) can indeed be seen as a von Neumann measurement in (Formula presented) 14. It is very plausible that there is no measurement using just linear optics reaching the optimal probability of unambiguous discrimination
    • The optimal generalized measurement of Eq. (28) in (Formula presented) can indeed be seen as a von Neumann measurement in (Formula presented) 14. It is very plausible that there is no measurement using just linear optics reaching the optimal probability of unambiguous discrimination.
  • 31
    • 85037201426 scopus 로고    scopus 로고
    • Incidentally note that using the nonperfect but subpoissonian sources of Ref. 8, this distance can be further increased, since the higher photon-number components are proportionally much smaller than in the poissonian case
    • Incidentally note that using the nonperfect but subpoissonian sources of Ref. 8, this distance can be further increased, since the higher photon-number components are proportionally much smaller than in the poissonian case.
  • 36
    • 85037213255 scopus 로고    scopus 로고
    • After completition of this work, the optimal (Formula presented) phase covariant cloning machine was found in G. M. D’Ariano and C. Macchiavello, quant-ph/0301175. There, the optimal fidelity is shown to be equal to (Formula presented) slightly larger than the one given in Appendix D of the present paper, (Formula presented)
    • D’Ariano, G.M.1    Macchiavello, C.2
  • 38
    • 85037219647 scopus 로고    scopus 로고
    • There may be other generalizations of the initial four-state protocol. For instance, for (Formula presented) one can consider a bit encoding different from the one in Fig. 88. The bit (Formula presented) can be associated to the states |0〉, |π/4〉, |π〉, |5π/4〉, where (Formula presented) and (Formula presented) to the other four states. In the sifting process, Alice always announces two states having an overlap of (Formula presented) as in the initial four-state protocol. In this way, (i) the discrimination on Bob’s side is more robust against imperfect measurement apparatus and (ii) the probability of accepting a bit is greater, (Formula presented) and then (Formula presented) only increases linearly with (Formula presented) Since the mean photon number does not need to be very large for having the same key rate generation, the number of multiphoton pulses at a given distance is smaller, and the protocol is more secure against PNS attacks using unambiguous discrimination. However, when one considers storing attacks, the protocol is not efficient. Indeed, Eve can always keep some photons (Formula presented) without being detected and wait for Alice’s announcement. Then, she has to distinguish between (Formula presented) copies of two states with overlap (Formula presented) While (Formula presented) increases with the number of bases, the overlap is independent of (Formula presented) Therefore, to increase (Formula presented) does not provide any advantage to the honest parties when they use this alternative encoding
    • There may be other generalizations of the initial four-state protocol. For instance, for (Formula presented) one can consider a bit encoding different from the one in Fig. 88. The bit (Formula presented) can be associated to the states |0〉, |π/4〉, |π〉, |5π/4〉, where (Formula presented) and (Formula presented) to the other four states. In the sifting process, Alice always announces two states having an overlap of (Formula presented) as in the initial four-state protocol. In this way, (i) the discrimination on Bob’s side is more robust against imperfect measurement apparatus and (ii) the probability of accepting a bit is greater, (Formula presented) and then (Formula presented) only increases linearly with (Formula presented) Since the mean photon number does not need to be very large for having the same key rate generation, the number of multiphoton pulses at a given distance is smaller, and the protocol is more secure against PNS attacks using unambiguous discrimination. However, when one considers storing attacks, the protocol is not efficient. Indeed, Eve can always keep some photons (Formula presented) without being detected and wait for Alice’s announcement. Then, she has to distinguish between (Formula presented) copies of two states with overlap (Formula presented) While (Formula presented) increases with the number of bases, the overlap is independent of (Formula presented) Therefore, to increase (Formula presented) does not provide any advantage to the honest parties when they use this alternative encoding.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.