Skip to main content
Erschienen in: Quantum Information Processing 3/2016

01.03.2016

On conclusive eavesdropping and measures of mutual information in quantum key distribution

verfasst von: Alexey E. Rastegin

Erschienen in: Quantum Information Processing | Ausgabe 3/2016

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

We address the question of quantifying eavesdropper’s information gain in an individual attack on systems of quantum key distribution. It is connected with the concept of conclusive eavesdropping introduced by Brandt. Using the BB84 protocol, we examine the problem of estimating a performance of conclusive entangling probe. The question of interest depends on the choice of a quantitative measure of eavesdropper’s information about the error-free sifted bits. The Fuchs–Peres–Brandt probe realizes a very powerful individual attack on the BB84 scheme. In the usual formulation, Eve utilizes the Helstrom scheme in distinguishing between the two output probe states. In conclusive eavesdropping, the unambiguous discrimination is used. Comparing these two versions allows to demonstrate serious distinctions between widely used quantifiers of mutual information. In particular, the so-called Rényi mutual information does not seem to be a completely legitimate measure of an amount of mutual information. It is brightly emphasized with the example of conclusive eavesdropping.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Lomonaco, S.J.: A quick glance at quantum cryptography. Cryptologia 23, 1–41 (1999)CrossRefMATH Lomonaco, S.J.: A quick glance at quantum cryptography. Cryptologia 23, 1–41 (1999)CrossRefMATH
2.
Zurück zum Zitat Gisin, N., Ribordy, G., Tittel, W., Zbinden, H.: Quantum cryptography. Rev. Mod. Phys. 74, 145–195 (2002)ADSCrossRef Gisin, N., Ribordy, G., Tittel, W., Zbinden, H.: Quantum cryptography. Rev. Mod. Phys. 74, 145–195 (2002)ADSCrossRef
3.
Zurück zum Zitat van Assche, G.: Quantum Cryptography and Secret-Key Distillation. Cambridge University Press, Cambridge (2006)CrossRefMATH van Assche, G.: Quantum Cryptography and Secret-Key Distillation. Cambridge University Press, Cambridge (2006)CrossRefMATH
4.
Zurück zum Zitat Barnett, S.M.: Quantum Information. Oxford University Press, Oxford (2009)MATH Barnett, S.M.: Quantum Information. Oxford University Press, Oxford (2009)MATH
5.
8.
Zurück zum Zitat Brandt, H.E.: Conclusive eavesdropping in quantum key distribution. J. Opt. B: Quantum Semiclass. Opt. 7, S553–S556 (2005)ADSMathSciNetCrossRef Brandt, H.E.: Conclusive eavesdropping in quantum key distribution. J. Opt. B: Quantum Semiclass. Opt. 7, S553–S556 (2005)ADSMathSciNetCrossRef
10.
Zurück zum Zitat Brandt, H.E.: Alternative design for quantum cryptographic entangling probe. J. Mod. Opt. 53, 1041–1045 (2006)ADSCrossRefMATH Brandt, H.E.: Alternative design for quantum cryptographic entangling probe. J. Mod. Opt. 53, 1041–1045 (2006)ADSCrossRefMATH
11.
Zurück zum Zitat Brandt, H.E., Myers, J.M.: Expanded quantum cryptographic entangling probe. J. Mod. Opt. 53, 1927–1930 (2006)ADSCrossRefMATH Brandt, H.E., Myers, J.M.: Expanded quantum cryptographic entangling probe. J. Mod. Opt. 53, 1927–1930 (2006)ADSCrossRefMATH
12.
Zurück zum Zitat Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of the IEEE International Conference on Computers. Systems, and Signal Processing, Bangalore, India, pp. 175–179. IEEE, New York (1984) Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of the IEEE International Conference on Computers. Systems, and Signal Processing, Bangalore, India, pp. 175–179. IEEE, New York (1984)
13.
Zurück zum Zitat Ekert, A.K., Huttner, B., Palma, G.M., Peres, A.: Eavesdropping on quantum cryptographical systems. Phys. Rev. A 50, 1047–1056 (1994)ADSCrossRef Ekert, A.K., Huttner, B., Palma, G.M., Peres, A.: Eavesdropping on quantum cryptographical systems. Phys. Rev. A 50, 1047–1056 (1994)ADSCrossRef
14.
Zurück zum Zitat Huttner, B., Muller, A., Gautier, J.D., Zbinden, H., Gisin, N.: Unambiguous quantum measurement of nonorthogonal states. Phys. Rev. A 54, 3783–3789 (1996)ADSMathSciNetCrossRef Huttner, B., Muller, A., Gautier, J.D., Zbinden, H., Gisin, N.: Unambiguous quantum measurement of nonorthogonal states. Phys. Rev. A 54, 3783–3789 (1996)ADSMathSciNetCrossRef
16.
Zurück zum Zitat Herbauts, I.M., Bettelli, S., Hübel, H., Peev, M.: On the optimality of individual entangling-probe attacks against BB84 quantum key distribution. Eur. Phys. J. D 46, 395–406 (2008)ADSCrossRef Herbauts, I.M., Bettelli, S., Hübel, H., Peev, M.: On the optimality of individual entangling-probe attacks against BB84 quantum key distribution. Eur. Phys. J. D 46, 395–406 (2008)ADSCrossRef
17.
18.
19.
Zurück zum Zitat Brukner, C̆., Zeillinger, A.: Conceptual inadequacy of the Shannon information in quantum measurements. Phys. Rev. A 63, 022113 (2001)ADSCrossRef Brukner, C̆., Zeillinger, A.: Conceptual inadequacy of the Shannon information in quantum measurements. Phys. Rev. A 63, 022113 (2001)ADSCrossRef
20.
Zurück zum Zitat Rastegin, A.E.: On the Brukner–Zeilinger approach to information in quantum measurements. Proc. R. Soc. A 471, 20150435 (2015)ADSCrossRef Rastegin, A.E.: On the Brukner–Zeilinger approach to information in quantum measurements. Proc. R. Soc. A 471, 20150435 (2015)ADSCrossRef
21.
Zurück zum Zitat Nielsen, M.A., Chuang, I.L.: Quantum Computation and Quantum Information. Cambridge University Press, Cambridge (2000)MATH Nielsen, M.A., Chuang, I.L.: Quantum Computation and Quantum Information. Cambridge University Press, Cambridge (2000)MATH
22.
23.
Zurück zum Zitat Fuchs, C.A., van de Graaf, J.: Cryptographic distinguishability measures for quantum mechanical states. IEEE Trans. Inf. Theory 45, 1216–1227 (1999)MathSciNetCrossRefMATH Fuchs, C.A., van de Graaf, J.: Cryptographic distinguishability measures for quantum mechanical states. IEEE Trans. Inf. Theory 45, 1216–1227 (1999)MathSciNetCrossRefMATH
24.
Zurück zum Zitat Biham, E., Boyer, M., Brassard, G., van de Graaf, J., Mor, T.: Security of quantum key distribution against all collective attacks. Algorithmica 34, 372–388 (2002)MathSciNetCrossRefMATH Biham, E., Boyer, M., Brassard, G., van de Graaf, J., Mor, T.: Security of quantum key distribution against all collective attacks. Algorithmica 34, 372–388 (2002)MathSciNetCrossRefMATH
26.
Zurück zum Zitat Rényi, A.: On measures of entropy and information. In: Neyman, J. (ed.) Proceedings of 4th Berkeley Symposium on Mathematical Statistics and Probability, vol. I, pp. 547–561. University of California Press, Berkeley (1961) Rényi, A.: On measures of entropy and information. In: Neyman, J. (ed.) Proceedings of 4th Berkeley Symposium on Mathematical Statistics and Probability, vol. I, pp. 547–561. University of California Press, Berkeley (1961)
27.
28.
29.
Zurück zum Zitat Bengtsson, I., Życzkowski, K.: Geometry of Quantum States: An Introduction to Quantum Entanglement. Cambridge University Press, Cambridge (2006)CrossRefMATH Bengtsson, I., Życzkowski, K.: Geometry of Quantum States: An Introduction to Quantum Entanglement. Cambridge University Press, Cambridge (2006)CrossRefMATH
30.
Zurück zum Zitat Teixeira, A., Matos, A., Antunes, L.: Conditional Rényi entropies. IEEE Trans. Inf. Theory 58, 4273–4277 (2012)MathSciNetCrossRef Teixeira, A., Matos, A., Antunes, L.: Conditional Rényi entropies. IEEE Trans. Inf. Theory 58, 4273–4277 (2012)MathSciNetCrossRef
31.
Zurück zum Zitat Cachin, C.: Entropy measures and unconditional security in cryptography. Ph.D. thesis, Swiss Federal Institute of Technology, Zürich (1997) Cachin, C.: Entropy measures and unconditional security in cryptography. Ph.D. thesis, Swiss Federal Institute of Technology, Zürich (1997)
32.
33.
Zurück zum Zitat Erdogmus, D., Principe, J.C.: Lower and upper bounds for misclassification probability based on Rényi’s information. J. VLSI Signal Process. 37, 305–317 (2004)CrossRefMATH Erdogmus, D., Principe, J.C.: Lower and upper bounds for misclassification probability based on Rényi’s information. J. VLSI Signal Process. 37, 305–317 (2004)CrossRefMATH
35.
Zurück zum Zitat Slutsky, B.A., Rao, R., Sun, P.-C., Fainman, Y.: Security of quantum cryptography against individual attacks. Phys. Rev. A 57, 2383–2398 (1998)ADSCrossRef Slutsky, B.A., Rao, R., Sun, P.-C., Fainman, Y.: Security of quantum cryptography against individual attacks. Phys. Rev. A 57, 2383–2398 (1998)ADSCrossRef
36.
Zurück zum Zitat Shapiro, J.H., Wong, F.N.C.: Attacking quantum key distribution with single-photon two-qubit quantum logic. Phys. Rev. A 73, 012315 (2006)ADSCrossRef Shapiro, J.H., Wong, F.N.C.: Attacking quantum key distribution with single-photon two-qubit quantum logic. Phys. Rev. A 73, 012315 (2006)ADSCrossRef
37.
Zurück zum Zitat Scarani, V., Bechmann-Pasquinucci, H., Cerf, N.J., Dušek, M., Lütkenhaus, N., Peev, M.: The security of practical quantum key distribution. Rev. Mod. Phys. 81, 1301–1350 (2009)ADSCrossRef Scarani, V., Bechmann-Pasquinucci, H., Cerf, N.J., Dušek, M., Lütkenhaus, N., Peev, M.: The security of practical quantum key distribution. Rev. Mod. Phys. 81, 1301–1350 (2009)ADSCrossRef
38.
Zurück zum Zitat Fuchs, C.A., Peres, A.: Quantum state disturbance versus information gain: uncertainty relations for quantum information. Phys. Rev. A 53, 2038–2045 (1996)ADSCrossRef Fuchs, C.A., Peres, A.: Quantum state disturbance versus information gain: uncertainty relations for quantum information. Phys. Rev. A 53, 2038–2045 (1996)ADSCrossRef
39.
Zurück zum Zitat Helstrom, C.W.: Detection theory and quantum mechanics. Inform. Control 10, 254–291 (1967)CrossRef Helstrom, C.W.: Detection theory and quantum mechanics. Inform. Control 10, 254–291 (1967)CrossRef
40.
Zurück zum Zitat Helstrom, C.W.: Quantum Detection and Estimation Theory. Academic Press, New York (1976)MATH Helstrom, C.W.: Quantum Detection and Estimation Theory. Academic Press, New York (1976)MATH
44.
Zurück zum Zitat Baek, K., Farrow, T., Son, W.: Optimized entropic uncertainty for successive projective measurements. Phys. Rev. A 89, 032108 (2014)ADSCrossRef Baek, K., Farrow, T., Son, W.: Optimized entropic uncertainty for successive projective measurements. Phys. Rev. A 89, 032108 (2014)ADSCrossRef
45.
Zurück zum Zitat Zhang, J., Zhang, Y., Yu, C.-S.: Rényi entropy uncertainty relation for successive projective measurements. Quantum Inf. Process. 14, 2239–2253 (2015)ADSMathSciNetCrossRefMATH Zhang, J., Zhang, Y., Yu, C.-S.: Rényi entropy uncertainty relation for successive projective measurements. Quantum Inf. Process. 14, 2239–2253 (2015)ADSMathSciNetCrossRefMATH
48.
Zurück zum Zitat Bennett, C.H., Gács, P., Li, M., Vitányi, P.M.D., Zurek, W.H.: Information distance. IEEE Trans. Inf. Theory 44, 1407–1423 (1998)MathSciNetCrossRefMATH Bennett, C.H., Gács, P., Li, M., Vitányi, P.M.D., Zurek, W.H.: Information distance. IEEE Trans. Inf. Theory 44, 1407–1423 (1998)MathSciNetCrossRefMATH
49.
Zurück zum Zitat Rastegin, A.E.: On generalized entropies and information-theoretic Bell inequalities under decoherence. Ann. Phys. 355, 241–257 (2015)ADSMathSciNetCrossRef Rastegin, A.E.: On generalized entropies and information-theoretic Bell inequalities under decoherence. Ann. Phys. 355, 241–257 (2015)ADSMathSciNetCrossRef
Metadaten
Titel
On conclusive eavesdropping and measures of mutual information in quantum key distribution
verfasst von
Alexey E. Rastegin
Publikationsdatum
01.03.2016
Verlag
Springer US
Erschienen in
Quantum Information Processing / Ausgabe 3/2016
Print ISSN: 1570-0755
Elektronische ISSN: 1573-1332
DOI
https://doi.org/10.1007/s11128-015-1198-3

Weitere Artikel der Ausgabe 3/2016

Quantum Information Processing 3/2016 Zur Ausgabe