Skip to main content
Log in

Coherent attacking continuous-variable quantum key distribution with entanglement in the middle

  • Published:
Quantum Information Processing Aims and scope Submit manuscript

Abstract

We suggest an approach on the coherent attack of continuous-variable quantum key distribution (CVQKD) with an untrusted entangled source in the middle. The coherent attack strategy can be performed on the double links of quantum system, enabling the eavesdropper to steal more information from the proposed scheme using the entanglement correlation. Numeric simulation results show the improved performance of the attacked CVQKD system in terms of the derived secret key rate with the controllable parameters maximizing the stolen information.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Scarani, V., Bechmann-Pasquinucci, H., Cerf, N.J., Dušek, M., Lütkenhaus, N., Peev, M.: The security of practical quantum key distribution. Rev. Mod. Phys. 81(3), 1301 (2009)

    Article  ADS  Google Scholar 

  2. Braunstein, S.L., Van Loock, P.: Quantum information with continuous variables. Rev. Mod. Phys. 77(2), 513 (2005)

    Article  ADS  MathSciNet  MATH  Google Scholar 

  3. Grosshans, F., Van Assche, G., Wenger, J., Brouri, R., Cerf, N.J., Grangier, P.: Quantum key distribution using gaussian-modulated coherent states. Nature 421(6920), 238–241 (2003)

    Article  ADS  Google Scholar 

  4. Weedbrook, C., Lance, A.M., Bowen, W.P., Symul, T., Ralph, T.C., Lam, P.K.: Quantum cryptography without switching. Phys. Rev. Lett. 93(17), 170504 (2004)

    Article  ADS  Google Scholar 

  5. Grosshans, F., Grangier, P.: Continuous variable quantum cryptography using coherent states. Phys. Rev. Lett. 88(5), 057902 (2002)

    Article  ADS  Google Scholar 

  6. Lodewyck, J., Bloch, M., García-Patrón, R., Fossier, S., Karpov, E., Diamanti, E., Debuisschert, T., Cerf, N.J., Tualle-Brouri, R., McLaughlin, S.W., et al.: Quantum key distribution over 25 km with an all-fiber continuous-variable system. Phys. Rev. A 76(4), 042305 (2007)

    Article  ADS  Google Scholar 

  7. Jouguet, P., Kunz-Jacques, S., Diamanti, E.: Preventing calibration attacks on the local oscillator in continuous-variable quantum key distribution. Phys. Rev. A 87(6), 062313 (2013)

    Article  ADS  Google Scholar 

  8. Huang, D., Huang, P., Lin, D., Zeng, G.: Long-distance continuous-variable quantum key distribution by controlling excess noise. Sci. Rep. 6, 19201 (2016)

    Article  ADS  Google Scholar 

  9. Wang, C., Huang, P., Huang, D., Lin, D., Zeng, G.: Practical security of continuous-variable quantum key distribution with finite sampling bandwidth effects. Phys. Rev. A 93(2), 022315 (2016)

    Article  ADS  Google Scholar 

  10. Guo, Y., Liao, Q., Huang, D., Zeng, G.: Quantum relay schemes for continuous-variable quantum key distribution. Phys. Rev. A 95, 042326 (2017)

    Article  ADS  Google Scholar 

  11. Pirandola, S., Mancini, S., Lloyd, S., Braunstein, S.L.: Continuous-variable quantum cryptography using two-way quantum communication. Nat. Phys. 4(9), 726–730 (2008)

    Article  Google Scholar 

  12. Ottaviani, C., Pirandola, S.: General immunity and superadditivity of two-way gaussian quantum cryptography. Sci. Rep. 6, 22225 (2016)

    Article  ADS  Google Scholar 

  13. Navascués, M., Grosshans, F., Acin, A.: Optimality of gaussian attacks in continuous-variable quantum cryptography. Phys. Rev. Lett. 97(19), 190502 (2006)

    Article  ADS  Google Scholar 

  14. Garcia-Patron, R., Cerf, N.J.: Unconditional optimality of gaussian attacks against continuous-variable quantum key distribution. Phys. Rev. Lett. 97(19), 190503 (2006)

    Article  ADS  Google Scholar 

  15. Furrer, F., Franz, T., Berta, M., Leverrier, A., Scholz, V.B., Tomamichel, M., Werner, R.F.: Continuous variable quantum key distribution: finite-key analysis of composable security against coherent attacks. Phys. Rev. Lett. 109(10), 100502 (2012)

    Article  ADS  Google Scholar 

  16. Grosshans, F.: Collectiveattacks and unconditional security in continuous variable quantum keydistribution. Phys. Rev. Lett. 94(2), 020504 (2005)

    Article  ADS  Google Scholar 

  17. Navascués, M., Acín, A.: Securitybounds for continuous variables quantum key distribution. Phys. Rev. Lett. 94(2), 020505 (2005)

    Article  ADS  Google Scholar 

  18. Jouguet, P., Kunz-Jacques, S., Leverrier, A.: Long-distance continuous-variable quantum key distribution with a gaussian modulation. Phys. Rev. A 84(6), 062317 (2011)

    Article  ADS  Google Scholar 

  19. Lo, H.K., Curty, M., Qi, B.: Measurement-device-independent quantum key distribution. Phys. Rev. Lett. 108(13), 130503 (2012)

    Article  ADS  Google Scholar 

  20. Pirandola, S., Ottaviani, C., Spedalieri, G., Weedbrook, C., Braunstein, S.L., Lloyd, S., Gehring, T., Jacobsen, C.S., Andersen, U.L.: High-rate measurement-device-independent quantum cryptography. Nat. Photonics 9(6), 397 (2015)

    Article  ADS  Google Scholar 

  21. Weedbrook, C.: Continuous-variable quantum key distribution with entanglement in the middle. Phys. Rev. A 87(2), 022308 (2013)

    Article  ADS  MathSciNet  Google Scholar 

  22. Guo, Y., Liao, Q., Wang, Y., Huang, D., Huang, P., Zeng, G.: Performance improvement of continuous-variable quantum key distribution with an entangled source in the middle via photon subtraction. Phys. Rev. A 95, 032304 (2017)

    Article  ADS  Google Scholar 

  23. Weedbrook, C., Pirandola, S., Garcia-Patron, R., Cerf, N.J., Ralph, T.C., Shapiro, J.H., Lloyd, S.: Gaussian quantum information. Rev. Mod. Phys. 84(2), 621 (2012)

    Article  ADS  Google Scholar 

  24. Wu, Y., Zhou, J., Gong, X., Guo, Y., Zhang, Z.M., He, G.: Continuous-variable measurement-device-independent multipartite quantum communication. Phys. Rev. A 93(2), 022325 (2016)

    Article  ADS  Google Scholar 

  25. Ottaviani, C., Spedalieri, G., Braunstein, S.L., Pirandola, S.: Continuous-variable quantum cryptography with an untrusted relay: detailed security analysis of the symmetric configuration. Phys. Rev. A 91(2), 022320 (2015)

    Article  ADS  MathSciNet  Google Scholar 

  26. Pirandola, S., Ottaviani, C., Spedalieri, G., Weedbrook, C., Braunstein, S.L., Lloyd, S., Gehring, T., Jacobsen, C.S., Andersen, U.L.: Reply to ’Discrete and continuous variables for measurement-device-independent quantum cryptography’. Nat. Photonics 9(12), 773 (2015)

    Article  ADS  Google Scholar 

  27. Zhou, J., Guo, Y.: Continuous-variable measurement-device-independent multipartite quantum communication using coherent states. J. Phys. Soc. Jpn. 86(2), 024003 (2016)

    Article  ADS  Google Scholar 

  28. Pirandola, S., Serafini, A., Lloyd, S.: Correlation matrices of two-mode bosonic systems. Phys. Rev. A 79(5), 052327 (2009)

    Article  ADS  Google Scholar 

  29. Pirandola, S.: Entanglement reactivation in separable environments. New J. Phys. 15(11), 113046 (2013)

    Article  ADS  Google Scholar 

  30. Cerf, N.J., Levy, M., Van Assche, G.: Quantum distribution of gaussian keys using squeezed states. Phys. Rev. A 63(5), 052311 (2001)

    Article  ADS  Google Scholar 

  31. Usenko, V.C., Filip, R.: Squeezed-state quantum key distribution upon imperfect reconciliation. New J. Phys. 13(11), 113007 (2011)

    Article  ADS  Google Scholar 

  32. Nicolas, C., Sanchez, R.G.P.: Quantum information with optical continuous variables: from Bell tests to key distribution. PhD thesis, Universite Libre De Bruxelles (2007).

  33. Ottaviani, C., Mancini, S., Pirandola, S.: Two-way gaussian quantum cryptography against coherent attacks in direct reconciliation. Phys. Rev. A 92(6), 062323 (2015)

    Article  ADS  Google Scholar 

  34. Liu, Y., Chen, T.Y., Wang, L.J., Liang, H., Shentu, G.L., Wang, J., Cui, K., Yin, H.L., Liu, N.L., Li, L., et al.: Experimental measurement-device-independent quantum key distribution. Phys. Rev. Lett. 111(13), 130502 (2013)

    Article  ADS  Google Scholar 

Download references

Acknowledgements

This work was supported by the National Natural Science Foundation of China (Grant Nos. 61379153, 61572529).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ying Guo.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhang, Z., Shi, R., Zeng, G. et al. Coherent attacking continuous-variable quantum key distribution with entanglement in the middle. Quantum Inf Process 17, 133 (2018). https://doi.org/10.1007/s11128-018-1903-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11128-018-1903-0

Keywords

Navigation