Security of decoy-state protocols for general photon-number-splitting attacks

Rolando D. Somma and Richard J. Hughes
Phys. Rev. A 87, 062330 – Published 24 June 2013

Abstract

Decoy-state protocols provide a way to defeat photon-number-splitting attacks in quantum cryptography implemented with weak coherent pulses. We point out that previous security analyses of such protocols relied on assumptions about eavesdropping attacks that considered treating each pulse equally and independently. We give an example to demonstrate that, without such assumptions, the security parameters of previous decoy-state implementations could be worse than the ones claimed. Next we consider more general photon-number-splitting attacks, which correlate different pulses, and give an estimation procedure for the number of single-photon signals with rigorous security statements. The impact of our result is that previous analyses of the number of times a decoy-state quantum cryptographic system can be reused before it makes a weak key must be revised.

  • Figure
  • Figure
  • Figure
  • Figure
  • Received 22 April 2013

DOI:https://doi.org/10.1103/PhysRevA.87.062330

©2013 American Physical Society

Authors & Affiliations

Rolando D. Somma* and Richard J. Hughes

  • Los Alamos National Laboratory, Los Alamos, New Mexico 87545, USA

  • *somma@lanl.gov
  • rxh@lanl.gov

Article Text (Subscription Required)

Click to Expand

References (Subscription Required)

Click to Expand
Issue

Vol. 87, Iss. 6 — June 2013

Reuse & Permissions
Access Options
Author publication services for translation and copyediting assistance advertisement

Authorization Required


×
×

Images

×

Sign up to receive regular email alerts from Physical Review A

Log In

Cancel
×

Search


Article Lookup

Paste a citation or DOI

Enter a citation
×