Security of quantum cryptography using balanced homodyne detection

In this paper we investigate the security of a quantum cryptographic scheme which utilizes balanced homodyne detection and weak coherent pulses (WCP). The performance of the system is mainly characterized by the intensity of the WCP and postselected threshold. Two of the simplest intercept and resend eavesdropping attacks are analyzed. The secure key gain for a given loss is also discussed in terms of the pulse intensity and threshold.

[1]  N. Cerf,et al.  Quantum distribution of Gaussian keys using squeezed states , 2000, quant-ph/0008058.

[2]  Norbert Lütkenhaus,et al.  ESTIMATES FOR PRACTICAL QUANTUM CRYPTOGRAPHY , 1999 .

[3]  P. Grangier,et al.  Continuous variable quantum cryptography using coherent states. , 2001, Physical review letters.

[4]  Ekert,et al.  Eavesdropping on quantum-cryptographical systems. , 1994, Physical review. A, Atomic, molecular, and optical physics.

[5]  Stephen M. Barnett,et al.  Conditional beam-splitting attack on quantum key distribution , 2001 .

[6]  N. Lütkenhaus Security against individual attacks for realistic quantum key distribution , 2000 .

[7]  Sasaki,et al.  Optimum decision scheme with a unitary control process for binary quantum-state signals. , 1996, Physical review. A, Atomic, molecular, and optical physics.

[8]  Goodman,et al.  Quantum correlations: A generalized Heisenberg uncertainty relation. , 1988, Physical review letters.

[9]  M. Hillery Quantum cryptography with squeezed states , 1999, quant-ph/9909006.

[10]  Measuring the Quantum State of Light , 2000 .

[11]  Charles H. Bennett,et al.  Quantum cryptography using any two nonorthogonal states. , 1992, Physical review letters.

[12]  Gilles Brassard,et al.  Quantum Cryptography , 2005, Encyclopedia of Cryptography and Security.

[13]  H. Paul,et al.  Measuring the quantum state of light , 1997 .

[14]  Kumar,et al.  Squeezed-light generation with an incoherent pump. , 1990, Physical review letters.

[15]  Ueli Maurer,et al.  Generalized privacy amplification , 1994, Proceedings of 1994 IEEE International Symposium on Information Theory.

[16]  Timothy C. Ralph Security of continuous-variable quantum cryptography , 2000 .

[17]  Lütkenhaus Security against eavesdropping in quantum cryptography. , 1996, Physical review. A, Atomic, molecular, and optical physics.

[18]  Yeshaiahu Fainman,et al.  Security of quantum cryptography against individual attacks , 1998 .

[19]  Gisin,et al.  Quantum cryptography with coherent states. , 1995, Physical review. A, Atomic, molecular, and optical physics.

[20]  Sanders,et al.  Limitations on practical quantum cryptography , 2000, Physical review letters.

[21]  Gisin,et al.  Unambiguous quantum measurement of nonorthogonal states. , 1996, Physical review. A, Atomic, molecular, and optical physics.

[22]  G Leuchs,et al.  Continuous variable quantum cryptography: beating the 3 dB loss limit. , 2002, Physical review letters.

[23]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.

[24]  Masashi Ban,et al.  Optimizations of quantum measurement processes for signal detection and information transmission in quantum systems , 1996 .

[25]  M. Reid Quantum cryptography with a predetermined key, using continuous-variable Einstein-Podolsky-Rosen correlations , 1999, quant-ph/9909030.

[26]  Blow,et al.  Continuum fields in quantum optics. , 1990, Physical review. A, Atomic, molecular, and optical physics.