Upper bounds on the performance of differential-phase-shift quantum key distribution

In this paper, we investigate limitations imposed by sequential attacks on the performance of a differential-phase-shift (DPS) quantum key distribution (QKD) protocol with weak coherent pulses. Specifically, we analyze a sequential attack based on optimal unambiguous discrimination of the relative phases between consecutive signal states emitted by the source. We show that this attack can provide tighter upper bounds for the security of a DPS QKD scheme than those derived from sequential attacks where the eavesdropper aims to identify the state of each signal emitted by the source unambiguously.

[1]  Toyohiro Tsurumaru Sequential attack with intensity modulation on the differential-phase-shift quantum-key-distribution protocol , 2007 .

[2]  Hiroki Takesue,et al.  100 km differential phase shift quantum key distribution experiment with low jitter up-conversion detectors. , 2006, Optics express.

[3]  Yoshihisa Yamamoto,et al.  Differential phase shift quantum key distribution. , 2002 .

[4]  Miloslav Dusek,et al.  Unambiguous state discrimination in quantum cryptography with weak coherent states , 2000 .

[5]  G. David Forney,et al.  Geometrically uniform codes , 1991, IEEE Trans. Inf. Theory.

[6]  Charles H. Bennett,et al.  Quantum cryptography using any two nonorthogonal states. , 1992, Physical review letters.

[7]  Gisin,et al.  Quantum cryptography with coherent states. , 1995, Physical review. A, Atomic, molecular, and optical physics.

[8]  Won-Young Hwang Quantum key distribution with high loss: toward global secure communication. , 2003, Physical review letters.

[9]  M. Fejer,et al.  Differential phase shift quantum key distribution experiment over 105 km fibre , 2005, quant-ph/0507110.

[10]  Gilles Brassard,et al.  Quantum Cryptography , 2005, Encyclopedia of Cryptography and Security.

[11]  John Preskill,et al.  Security of quantum key distribution with imperfect devices , 2002, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..

[12]  A. Shimony,et al.  Optimal distinction between two non-orthogonal quantum states , 1995 .

[13]  Yoshihisa Yamamoto,et al.  Differential-phase-shift quantum key distribution using coherent light , 2003 .

[14]  M. Ruskai Qubit Entanglement Breaking Channels , 2003, quant-ph/0302032.

[15]  H. Inamori,et al.  Unconditional security of practical quantum key distribution , 2007 .

[16]  Xiang‐Bin Wang,et al.  Beating the PNS attack in practical quantum cryptography , 2004 .

[17]  Nicolas Gisin,et al.  Upper bounds for the security of two distributed-phase reference protocols of quantum cryptography , 2008 .

[18]  I. D. Ivanović How to differentiate between non-orthogonal states , 1987 .

[19]  Momtchil Peev,et al.  A Framework for Practical Quantum Cryptography , 2008 .

[20]  Norbert Lütkenhaus,et al.  Entanglement as a precondition for secure quantum key distribution. , 2004, Physical review letters.

[21]  M. Ruskai,et al.  Entanglement Breaking Channels , 2003, quant-ph/0302031.

[22]  Yonina C. Eldar A semidefinite programming approach to optimal unambiguous discrimination of quantumstates , 2003, IEEE Trans. Inf. Theory.

[23]  D. Dieks Overlap and distinguishability of quantum states , 1988 .

[24]  Marcos Curty,et al.  Effect of detector dead times on the security evaluation of differential-phase-shift quantum key distribution against sequential attacks , 2008, 0803.1473.

[25]  S. Barnett,et al.  Optimum unambiguous discrimination between linearly independent symmetric states , 1998, quant-ph/9807023.

[26]  M. Koashi,et al.  Unconditional security of the Bennett 1992 quantum-key-distribution scheme with a strong reference pulse , 2006, quant-ph/0607082.

[27]  Sae Woo Nam,et al.  Quantum key distribution over a 40-dB channel loss using superconducting single-photon detectors , 2007, 0706.0397.

[28]  D. Vernon Inform , 1995, Encyclopedia of the UN Sustainable Development Goals.

[29]  M. Koashi Unconditional security of coherent-state quantum key distribution with a strong phase-reference pulse. , 2004, Physical review letters.

[30]  Yonina C. Eldar,et al.  Designing optimal quantum detectors via semidefinite programming , 2003, IEEE Trans. Inf. Theory.

[31]  Hoi-Kwong Lo,et al.  Sequential attacks against differential-phase-shift quantum key distribution with weak coherent states , 2007, Quantum Inf. Comput..

[32]  Yoshihisa Yamamoto,et al.  Security of differential-phase-shift quantum key distribution against individual attacks , 2005, quant-ph/0508112.