Optimal eavesdropping on quantum key distribution without quantum memory

We consider the security of the BB84 (Bennett and Brassard 1984 Proc. IEEE Int. Conf. on Computers, Systems, and Signal Processing pp 175-9), six-state (Bruß 1998 Phys. Rev. Lett. 81 3018) and SARG04 (Scarani et al 2004 Phys. Rev. Lett. 92 057901) quantum key distribution protocols when the eavesdro...

Full description

Saved in:
Bibliographic Details
Published inJournal of physics. A, Mathematical and theoretical Vol. 45; no. 2; pp. 025305 - 10
Main Authors Bocquet, Aurélien, Alléaume, Romain, Leverrier, Anthony
Format Journal Article
LanguageEnglish
Published Bristol IOP Publishing 20.01.2012
IOP
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:We consider the security of the BB84 (Bennett and Brassard 1984 Proc. IEEE Int. Conf. on Computers, Systems, and Signal Processing pp 175-9), six-state (Bruß 1998 Phys. Rev. Lett. 81 3018) and SARG04 (Scarani et al 2004 Phys. Rev. Lett. 92 057901) quantum key distribution protocols when the eavesdropper does not have access to a quantum memory. In this case, Eve's most general strategy is to measure her ancilla with an appropriate positive operator-valued measure designed to take advantage of the post-measurement information that will be released during the sifting phase of the protocol. After an optimization on all the parameters accessible to Eve, our method provides us with new bounds for the security of six-state and SARG04 against a memoryless adversary. In particular, for the six-state protocol we show that the maximum quantum bit error ratio for which a secure key can be extracted is increased from 12.6% (for collective attacks) to 20.4% with the memoryless assumption.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 23
ISSN:1751-8113
1751-8121
1751-8121
DOI:10.1088/1751-8113/45/2/025305