Coherent-pulse implementations of quantum cryptography protocols resistant to photon-number-splitting attacks

We propose a class of quantum cryptography protocols that are robust against photon-number-splitting attacks (PNS) in a weak coherent-pulse implementation. We give a quite exhaustive analysis of several eavesdropping attacks on these schemes. The honest parties (Alice and Bob) use present-day technology, in particular an attenuated laser as an approximation of a single-photon source. The idea of the protocols is to exploit the nonorthogonality of quantum states to decrease the information accessible to Eve due to the multiphoton pulses produced by the imperfect source. The distance at which the key distribution becomes insecure due to the PNS attack is significantly increased compared to the existing schemes. We also show that strong-pulse implementations, where a strong pulse is included as a reference, allow for key distribution robust against photon-number-splitting attacks.

[1]  Klaus Mølmer,et al.  OPTICAL COHERENCE : A CONVENIENT FICTION , 1997 .

[2]  L. Ballentine,et al.  Quantum Theory: Concepts and Methods , 1994 .

[3]  Shor,et al.  Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.

[4]  Anthony Chefles Unambiguous discrimination between linearly dependent states with multiple copies , 2001, quant-ph/0105016.

[5]  N. Gisin,et al.  OPTIMAL EAVESDROPPING IN QUANTUM CRYPTOGRAPHY. I. INFORMATION BOUND AND OPTIMAL STRATEGY , 1997 .

[6]  Cerf,et al.  Pauli cloning of a quantum Bit , 2000, Physical review letters.

[7]  P. Grangier,et al.  Continuous variable quantum cryptography using coherent states. , 2001, Physical review letters.

[8]  S. Wolf,et al.  Quantum Cryptography on Noisy Channels: Quantum versus Classical Key-Agreement Protocols , 1999, quant-ph/9902048.

[9]  Sanders,et al.  Limitations on practical quantum cryptography , 2000, Physical review letters.

[10]  Gisin,et al.  Unambiguous quantum measurement of nonorthogonal states. , 1996, Physical review. A, Atomic, molecular, and optical physics.

[11]  S. Massar,et al.  Optimal Quantum Cloning Machines , 1997, quant-ph/9705046.

[12]  C. Helstrom Quantum detection and estimation theory , 1969 .

[13]  Robert B. Griffiths,et al.  Optimal copying of one quantum bit , 1998 .

[14]  W. Wootters,et al.  A single quantum cannot be cloned , 1982, Nature.

[15]  H. Bechmann-Pasquinucci,et al.  Quantum cryptography , 2001, quant-ph/0101098.

[16]  P. Grangier,et al.  Single photon quantum cryptography. , 2002, Physical Review Letters.

[17]  Kyo Inoue,et al.  Secure communication: Quantum cryptography with a photon turnstile , 2002, Nature.

[18]  N. Lütkenhaus Security against individual attacks for realistic quantum key distribution , 2000 .

[19]  Anthony Chefles,et al.  Unambiguous discrimination between linearly independent quantum states , 1998, quant-ph/9807022.

[20]  Gisin,et al.  Quantum cryptography with coherent states. , 1995, Physical review. A, Atomic, molecular, and optical physics.

[21]  Nicolas J. Cerf,et al.  Asymmetric quantum cloning in any dimension , 1998, quant-ph/9805024.

[22]  Christopher A. Fuchs,et al.  Quantum state of a propagating laser field , 2002, Quantum Inf. Comput..

[23]  Charles H. Bennett,et al.  Quantum cryptography using any two nonorthogonal states. , 1992, Physical review letters.