scholarly journals The security of decoy state protocol in the partial photon number splitting attack

2013 ◽  
Vol 58 (31) ◽  
pp. 3859-3862 ◽  
Author(s):  
Dong Liu ◽  
Shuang Wang ◽  
ZhenQiang Yin ◽  
Wei Chen ◽  
ZhengFu Han
Author(s):  
Muhammad Kamran ◽  
Tahir Malik ◽  
Muhammad Mubashir Khan

Secure exchange of cryptographic keys is extremely important for any communication system where security and privacy of data is desirable. Although classical cryptographic algorithms provide computationally secure methods for secret key exchange, quantum key distribution (QKD) provides an extraordinary means to this end by guaranteeing unconditional security. Any malicious interception of communication by a man-in-the-middle on a QKD link immediately alerts sender and receiver by introducing an unavoidable error-rate. Higher-dimensional QKD protocols such as KMB09 exhibit higher eavesdropping error-rates with improved intrusion detection but their practical implementation is still awaited. In this paper, we present the design and implementation of KMB09 protocol using Laguerre–Gaussian orbital angular momentum to demonstrate and highlight the advantages of using dynamic spatial modes in QKD system. A complete error-rate analysis of KMB09 protocol implementation is presented with two different types of eavesdropping error-rates. Furthermore, we also demonstrate the decoy state method to show the robustness of the protocol against photon-number-splitting attack.


Author(s):  
Carl F Sabottke ◽  
Chris D Richardson ◽  
Petr Anisimov ◽  
Ulvi Yurtsever ◽  
Antia Lamas-Linares ◽  
...  

2022 ◽  
Vol 105 (1) ◽  
Author(s):  
Giulio Foletto ◽  
Francesco Picciariello ◽  
Costantino Agnesi ◽  
Paolo Villoresi ◽  
Giuseppe Vallone

2022 ◽  
Vol 19 (2) ◽  
pp. 025203
Author(s):  
S P Kulik ◽  
K S Kravtsov ◽  
S N Molotkov

Abstract The analysis of the security of quantum key distribution systems with respect to an attack with nondemolishing measurement of the number of photons (photon number splitting—PNS attack) is carried out under the assumption that in the communication channel in each parcel there is a pure Fock state with a different number of photons, and the distribution of states by number of photons has Poisson statistics. In reality, in the communication channel in each parcel there are not individual Fock states, but a pure coherent state with a random phase—a superposition of Fock states with different numbers of photons. The paper analyzes the necessary experimental resources necessary to prepare individual Fock states with a certain number of photons from the superposition of Fock states for a PNS attack. Optical schemes for implementing such an attack are given, and estimates of experimental parameters at which a PNS attack is possible are made.


2012 ◽  
Vol 14 (4) ◽  
pp. 043003 ◽  
Author(s):  
Carl F Sabottke ◽  
Chris D Richardson ◽  
Petr M Anisimov ◽  
Ulvi Yurtsever ◽  
Antia Lamas-Linares ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document