Are There Enough Decoy States to Ensure Key Secrecy in Quantum Cryptography?

The decoy state method has been proposed to detect a photon number splitting (PNS) attack. Today, the decoy state method is considered to be an almost universal method for proving the secrecy of quantum cryptography protocols and calculating the length of a secret key. In this paper, it is shown that there exist attacks, for example, a beam splitting (BS) attack, to which the decoy state method turns out to be insensitive. The decoy state method is oriented to the detection of changes in the photocount statistics of information states and decoy states under a PNS attack. Under a BS attack, the photocount statistics is not changed. As a result, the decoy state method significantly overestimates the length of the key. Thus, the decoy state method is not a universal method that allows the detection of various attacks. Apparently, due to a large number of publications on the decoy state method, a widespread opinion has been formed that this method is universal. This fact has led to attempts to adopt this method as an international standard in quantum cryptography, which is clearly premature.

[1]  Xiongfeng Ma,et al.  Decoy state quantum key distribution. , 2004, Physical review letters.

[2]  Hoi-Kwong Lo,et al.  Experimental quantum key distribution with source flaws , 2015 .

[3]  R. Renner,et al.  Uncertainty relation for smooth entropies. , 2010, Physical review letters.

[4]  James F. Dynes,et al.  A quantum access network , 2013, Nature.

[5]  A R Dixon,et al.  Efficient decoy-state quantum key distribution with quantified security. , 2013, Optics express.

[6]  Sanders,et al.  Limitations on practical quantum cryptography , 2000, Physical review letters.

[7]  John Preskill,et al.  Security of quantum key distribution with imperfect devices , 2002, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..

[8]  S. N. Molotkov,et al.  Decoy state method for quantum cryptography based on phase coding into faint laser pulses , 2017 .

[9]  F. Khodabakhshi,et al.  Applying Simulated Annealing For Optimal Operation of Multi-Reservoir Systems , 2009 .

[10]  Marco Tomamichel,et al.  Tight finite-key analysis for quantum cryptography , 2011, Nature Communications.

[11]  C. G. Peterson,et al.  Long-distance decoy-state quantum key distribution in optical fiber. , 2006, Physical review letters.

[12]  Александр Семенович Холево,et al.  Квантовые теоремы кодирования@@@Quantum coding theorems , 1998 .

[13]  Xiongfeng Ma,et al.  Improved key-rate bounds for practical decoy-state quantum-key-distribution systems , 2016, 1611.02524.

[14]  Xiang‐Bin Wang,et al.  Beating the PNS attack in practical quantum cryptography , 2004 .