Active Beam Splitting Attack Applied to Differential Phase Shift Quantum Key Distribution Protocol

The differential phase shift quantum key distribution protocol is of high interest due to its relatively simple practical implementation. This protocol uses trains of coherent pulses and allows the legitimate users to resist individual attacks. In this paper, a new attack on this protocol is proposed which is based on the idea of information extraction from the part of each coherent state and then making decision about blocking the rest part depending on the amount of extracted information.

[1]  A. S. Trushechkin,et al.  Perturbative treatment of inter-site couplings in the local description of open quantum networks , 2015, 1509.05754.

[2]  E. O. Kiktenko,et al.  Quantum key distribution protocol with pseudorandom bases , 2017, ArXiv.

[3]  A simple coherent attack and practical security of differential phase shift quantum cryptography , 2014 .

[4]  Christiane P. Koch,et al.  Training Schrödinger’s cat: quantum optimal control , 2015, 1508.00442.

[5]  Miloslav Dusek,et al.  Unambiguous state discrimination in quantum cryptography with weak coherent states , 2000 .

[6]  D. D’Alessandro Introduction to Quantum Control and Dynamics , 2007 .

[7]  S. Kozyrev,et al.  Manipulation of states of a degenerate quantum system , 2016 .

[8]  Hoi-Kwong Lo,et al.  Sequential attacks against differential-phase-shift quantum key distribution with weak coherent states , 2007, Quantum Inf. Comput..

[9]  H. Rabitz,et al.  CONTROL OF QUANTUM PHENOMENA , 2011 .

[10]  Michael Priestley,et al.  Proceedings of IEEE Professional Communication Society International Professional Communication Conference and Proceedings of the 18th Annual ACM International Conference on Computer Documentation: Technology & Teamwork, Cambridge, Massachusetts, USA, September 24-27, 2000 , 2000, SIGDOC.

[11]  Ian J. Spalding,et al.  Laser physics , 1977, Nature.

[12]  G. Milburn,et al.  Quantum Measurement and Control , 2009 .

[13]  I. Volovich Cauchy-Schwarz inequality-based criteria for the non-classicality of sub-Poisson and antibunched light , 2016 .

[14]  E. O. Kiktenko,et al.  Practical issues in decoy-state quantum key distribution based on the central limit theorem , 2017, ArXiv.

[15]  Yoshihisa Yamamoto,et al.  Differential phase shift quantum key distribution. , 2002 .

[16]  Rob Thew,et al.  Quantum Science and Technology—one year on , 2018 .

[17]  On a beam splitter attack and soft filtering of coherent states in differential phase shift quantum cryptography , 2014 .

[18]  Gisin,et al.  Quantum cryptography with coherent states. , 1995, Physical review. A, Atomic, molecular, and optical physics.

[19]  Toshihiko Sasaki,et al.  Information-theoretic security proof of differential-phase-shift quantum key distribution protocol based on complementarity , 2017 .

[20]  Masato Koashi,et al.  Unconditional security of coherent-state-based differential phase shift quantum key distribution protocol with block-wise phase randomization , 2012, 1208.1995.

[21]  Nicolas Gisin,et al.  Upper bounds for the security of two distributed-phase reference protocols of quantum cryptography , 2008 .

[22]  Renato Renner,et al.  Security of quantum key distribution , 2005, Ausgezeichnete Informatikdissertationen.

[23]  A. Trushechkin Semiclassical evolution of quantum wave packets on the torus beyond the Ehrenfest time in terms of Husimi distributions , 2016, 1607.07572.

[24]  A. K. Fedorov,et al.  Analysis of coherent quantum cryptography protocol vulnerability to an active beam-splitting attack , 2017 .

[25]  Alexander Semenovich Holevo,et al.  Quantum Systems, Channels, Information: A Mathematical Introduction , 2019 .