Next Article in Journal
Echo State Condition at the Critical Point
Next Article in Special Issue
An Android Malicious Code Detection Method Based on Improved DCA Algorithm
Previous Article in Journal
A Multivariate Multiscale Fuzzy Entropy Algorithm with Application to Uterine EMG Complexity Analysis
Previous Article in Special Issue
Intelligent Security IT System for Detecting Intruders Based on Received Signal Strength Indicators
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Quantum Key Distribution in the Presence of the Intercept-Resend with Faked States Attack

by
Luis Adrian Lizama-Pérez
1,*,
José Mauricio López
2 and
Eduardo De Carlos López
3
1
Graduate Department, Universidad Politécnica de Pachuca, Carretera Pachuca-Cd. Sahagún, Km. 20, Ex-Hacienda de Santa Bárbara, Municipio de Zempoala, Hidalgo 43830, Mexico
2
General Management, Cinvestav Querétaro, Libramiento Norponiente 2000, Real de Juriquilla, Santiago de Querétaro, Querétaro 76230, Mexico
3
Time and Frequency Laboratory, Centro Nacional De Metrología, Carretera a Los Cués Km. 4.5, El Marqués, Santiago de Querétaro, Querétaro 76246, Mexico
*
Author to whom correspondence should be addressed.
Entropy 2017, 19(1), 4; https://doi.org/10.3390/e19010004
Submission received: 3 November 2016 / Revised: 15 December 2016 / Accepted: 19 December 2016 / Published: 23 December 2016

Abstract

:
Despite the unconditionally secure theory of the Quantum Key Distribution ( Q K D ), several attacks have been successfully implemented against commercial Q K D systems. Those systems have exhibited some flaws, as the secret key rate of corresponding protocols remains unaltered, while the eavesdropper obtains the entire secret key. We propose the negative acknowledgment state quantum key distribution protocol as a novel protocol capable of detecting the eavesdropping activity of the Intercept Resend with Faked Sates ( I R F S ) attack without requiring additional optical components different from the B B 84 protocol because the system can be implemented as a high software module. In this approach, the transmitter interleaves pairs of quantum states, referred to here as parallel and orthogonal states, while the receiver uses active basis selection.

1. Introduction

Quantum Key Distribution ( Q K D ) represents a new cryptographic method to distribute a key between two remote users, usually called Alice and Bob [1]. Q K D systems require legitimate users to authenticate each other through a public channel. The purpose of a Q K D system is to generate secret bits that can be used to encrypt plaintext messages according to a simple xor function between the message and the secret key.
If an eavesdropper, commonly called Eve, tries to intercept the quantum channel to get the key, she will be detected. In such a case, Alice and Bob will discard the process before a key could be established. However, if they do not detect any eavesdropping activity, the quantum measurements can be used to derive the secret key [2]. After the transmission, Alice and Bob can compare a fraction of the exchanged key to see if there are any transmission errors caused by eavesdropping. Q K D systems have been carried out experimentally through dedicated optical fibers, across free space, weak laser pulses or single photons, entangled photon pairs or continuous variables [3].
Ideally, the security of Q K D protocols is supported by the properties of quantum mechanics, which make eavesdropping in the middle of the quantum channel detectable [1,4]. However, serious concerns arise at the technological level. Unfortunately, most of the promising Q K D systems are vulnerable to quantum hacking due to loopholes in the optical detection system [5,6,7,8,9,10,11,12,13,14,15]. Under this scenario, new Q K D methods must be developed to resist attacks related to such vulnerabilities as the Photon Number Splitting ( P N S ) and the Intercept and Resend with Faked States ( I R F S ) attacks [16,17].
In [18], we introduced a novel Q K D protocol that uses weak coherent states and active basis measurement, capable of detecting the P N S eavesdropping activity. The strengths of the a c k s t a t e (in [18] referred to as a c k Q K D ) against P N S attack were discussed in [19]. In this paper, we extend the a c k s t a t e protocol to the dual protocol n a c k s t a t e protocol to analyze its security against I R F S attack. One of the main advantages of the proposed protocol is that it protects against I R F S attack without requiring any changes in the hardware; only software changes are required. We do not discuss other attacks nor pretend to perform a general formal demonstration of its security.

2. Quantum Hacking in QKD Systems

A variety of attacks have been conceived of as exploiting the security of B B 84 -based systems, either theoretically or technologically. The Photon Number Splitting ( P N S ) attack can be included in the first category. In the second class, commonly referred to as quantum hacking, the Intercept Resend with Faked States ( I R F S ) attack can be mentioned, which exploits loopholes in the Avalanche Photo Diodes ( A P D s) of the electronic detection system. In the following section, we will describe the Intercept Resend ( I R ) attack and the Intercept-Resend with Faked States ( I R F S ).
(a) Intercept Resend ( I R ) attack
In the intercept resend attack, the eavesdropper measures each photon pulse sent by Alice, which she replaces with another pulse prepared in the quantum state that she has already measured. Eve is successful 50% of the time in measuring the pulse in the correct measurement basis, while Bob chooses half of the times the same basis as her; thus over time, she generates a Quantum Bit Error Rate ( Q B E R ) of 50 % × 50 % = 25 % (see Figure 1 and [4]).
(b) Intercept Resend with Faked States ( I R F S ) attack
In the Intercept Resend with Faked States ( I R F S ) attack, the eavesdropper is not interested in reconstructing the original states, but in producing instead pulses of that light that can be detected by Bob in a way that is controlled by her while she passes unnoticed in the quantum channel. The eavesdropper exploits imperfections of their optical system, so that Alice and Bob can assume that they are detecting the original quantum states while they are in fact detecting light pulses generated by Eve. These light pulses are called faked states [7]. To mount an I R F S attack, Eve can exploit some weaknesses of Bob’s detector, such as time shift [8,9,10] or quantum blinding [7,8,9].
The quantum blinding attack is an I R F S attack where the Q K D system is controlled by an eavesdropper using bright photon pulses during the linear mode operation of the A P D s. In such attacks, Eve can eavesdrop on the full secret key without increasing the Q B E R of the protocol. In order to achieve this, the eavesdropper sends bright pulses to Bob’s station that will be detected by the A P D , which would operate like a classical photo diode, instead of operating in Geiger mode. Eve now can use the I R F S attack to obtain the key [11,12].
As a result, as depicted in Figure 2a, if Bob chooses the same measurement basis as Eve, he gets a detection event in the corresponding A P D detector. Otherwise, if Bob measures with the opposite basis as shown in Figure 2b, the optical power is distributed over the two detectors, and no event is detected. Thus, Eve blinds Bob’s A P D s detectors to make them operate as classical photo diodes. At the final stage of the protocol, Eve exploits the announcements revealed by Bob over the public channel to perform the classical post-processing, getting the same secret bits as Alice and Bob.
A simple countermeasure that can be applied in the electronic detection system is a watchdog detector that detects bright faked states [13]. The intercept-resend with faked states attack and quantum blinding were first implemented over a commercial Q K D system at the University of Singapore [12].
To conclude this section, we emphasize that the I R F S attack works successfully on widely-used Q K D protocols, namely B B 84 , S A R G 04 , Differential Phase Shift ( D P S K ), Coherent One Way ( C O W ), Ekert [9] and the d e c o y s t a t e method, as pointed out in [13,20]. The attack exhibits an extra 3 dB loss because of the basis mismatch between Eve and Bob. This is easily compensated in practice by Eve, since she may use better detector efficiencies and surpass loss in the channel. Blinding attacks over detectors have been demonstrated in two commercially available Q K D systems [11]. It has been reported that Eve obtains the entire secret key while she remains undetected by the legitimate parties [12]. Finally, we remark that control detector attacks with active basis selection cause the gain from Eve to Bob be reduced by a half compared to the gain from Alice to Bob (see Figure 2 and Table A1 of Appendix A), according to the following rules [13]:
(i) 
For Bob’s basis choice matching Eve’s, the detector clicks deterministically;
(ii) 
For Bob’s basis choice not matching Eve’s, the faked state is not detected.

3. The Nack State Protocol

The n a c k s t a t e protocol is the dual version of the a c k s t a t e protocol discussed in [19]. Both of them constitute a generalization of the well-known B B 84 . The n a c k s t a t e protocol uses pairs of parallel and orthogonal states instead of only single non-orthogonal state used in the B B 84 . This simple difference makes the n a c k s t a t e resilient to the I R F S attack, as we will show later on. We chose the n a c k prefix to denote that provided Alice sends two quantum states to Bob, the second measurement acts as the negative acknowledgment ( n a c k ) of the previous one, because it yields the opposite bit result. In the rest of this section, we describe the n a c k s t a t e protocol, and in Section 4, we discuss how the n a c k s t a t e protocol is capable of detecting the I R F S attack.
We refer to the pair of quantum states as a biqubit. To be more specific, the following biqubits are defined in the n a c k s t a t e protocol: four parallel biqubits ( | 0 X , | 0 X ) , ( | 0 Z , | 0 Z ) , ( | 1 X , | 1 X ) , ( | 1 Z , | 1 Z ) and two orthogonal biqubits ( | 0 X , | 1 X ) , ( | 0 Z , | 1 Z ) . The parallel and orthogonal biqubits are randomly interleaved by Alice. The order of the quantum states within the biqubit does not affect the behavior of the protocol (see Figure 3). On the other side of the quantum channel, Bob measures two incoming states of a biqubit using the same measurement basis (X or Z). The n a c k s t a t e protocol can be described according to the following steps:
  • Alice is equipped with a photon source with an expected photon number μ that exhibits a Poisson distribution. Alice randomly chooses between a parallel or an orthogonal biqubit, and she prepares the biqubit to send it to Bob through the quantum channel;
  • Bob measures the biqubit (two incoming pulses) using the same measurement basis X (or Z) that he chooses randomly (in Section 4.2, we discuss that the consecutiveness of states can be avoided if Alice sends a burst of the first states of each pair, followed by a burst of the second states of each pair);
  • Bob announces publicly his measurement basis choices;
  • To share secret bits, Alice and Bob perform sifting using single compatible events and double compatible matching detection events (from parallel states). Similarly, they apply sifting to the double detection events that contain a single compatible detection event. For this purpose, Bob indicates if the single detection is the first or the second inside the biqubit;
  • Finally, they use an error correction algorithm and a privacy amplification method usually used in B B 84 -based protocols.
Table 1 shows an example of the n a c k s t a t e protocol. Here, Alice sends two biqubits to Bob. The first biqubit is the orthogonal pair ( | 0 X , | 1 X ) , and the second biqubit is the parallel pair ( | 1 Z , | 1 Z ) . If the two states sent by Alice arrive at Bob’s detection system without any error, a double detection event is produced. If only one of the two states of the biqubit arrives at Bob’s station, he obtains a single detection event.
The n a c k s t a t e protocol has been conceived of to use the same optical hardware of the B B 84 protocol; thus, it can be configured in most Q K D systems as a software module application. However, two additional tasks must be implemented: the random computation of biqubits before preparing and sending the quantum states and the sifting stage of the protocol, which must include (1) sifting of single matching (compatible or non-compatible), where Bob announces the number of the single detections inside the biqubit; and (2) sifting of double detection, matching or non-matching, from parallel or orthogonal states. The error correction and privacy amplification stages of the Q K D protocol do not require changes.
Until now, we have a protocol that behaves similarly to B B 84 . In the n a c k s t a t e protocol, most of the biqubits pulses sent by Alice arrive at Bob’s station as single pulses that behave like B B 84 signal pulses. However, we will see that in the presence of the I R F S attack, the eavesdropper unbalances the gain of the single and double detection events, which is useful to detect her presence in the middle of the quantum channel.
For the moment, we can say that the gain of single and double detection events can be properly computed by Alice as discussed in Appendix A. As a matter of fact, the double detection gain decreases quadratically with the transmittance of the channel, but Alice can verify the gain of the double detection events from parallel and from orthogonal states. It should be noted that in order to detect the I R F S , before using the Q B E R of the protocol, instead, we will verify, as the first step, the gain of the single and the double detection events.

4. Detecting the IRFS Attack

What should Alice and Bob expect from the absence of the I R F S attack? They expect a distribution of detection events according to the gains of Table A1 in Appendix A: for illustrative purposes, consider the case where μ = 0.2 , η B T = 0.8 , which is the overall efficiency between Alice and Bob and zero dark counts ( Y 0 = 0 ). Thus, the great majority of the total biqubits that Alice sends finishes at Bob’s station as lost biqubits (∼72.61%); single detection events are ∼25.2% and only ∼0.0219% of the measurement cases are double detection events. Although the double detection gain is small, it should not be considered negligible, because the number of pulses that Alice sends is high ( 10 11 10 13 [21]), and the transmission interval can be properly enhanced. However, for practical purposes, we will assume that the secret bits in the n a c k s t a t e protocol are produced by single detection events, and the key rate is at most the B B 84 key rate. Nevertheless, we argue that double detection events can be used to detect the I R F S attack, so in this section, we discuss the security of the protocol despite Eve’s efforts to improve her attack.

4.1. The I R F S Attack with Blinding Pulses and Quantum Channel Substitution

In the presence of the I R F S attack with blinding pulses, Eve is in the middle of the quantum channel using an optical detection system similar to Bob’s station. The challenge for Eve is to reproduce the gains of single and double detection events at Bob’s side to pass unnoticed in the quantum channel. However, the gain of the single detection events decreases linearly with the channel efficiency, but the double detection gain drops quadratically. In Appendix B, we show that, for practical parameters of the quantum channel, the eavesdropper cannot adjust the two gains simultaneously. Eve cannot control the two gains because:
  • The eavesdropper can adjust the transmittance of the channel to a unique value, either to adjust the single or the double detection gain.
  • Alice’s optical pulses arrive at Eve’s station sequentially. Thus, once the eavesdropper station has detected a pulse, she cannot know whether the next pulse will be also detected or lost. That is, Eve does not know when a single or a double detection event will occur.
Eve could adjust the efficiency of the quantum channel to the gain of the double detection events. Therefore, in order to remove the excess of the single detection gain, Eve could eliminate pulses according to some probability (e.g., 0.5). However, due to the second point stated before, the eavesdropper looses double detection pulses (a quarter in this example). Eve could be more selective removing only single detection events where the detection occurs in the second pulse. Using this strategy, Eve keeps the double detection gain unaltered. However, since Bob announces publicly the number of single detections inside the biqubit, first or second (see Table 1), the presence of Eve becomes noticeable.
Eve could combine the two strategies increasing the efficiency of the channel to produce an excess of the double, but also the single detection gain. The problem for Eve is that once she chooses a strategy to remove pulses, it affects equally the single and the double detection gains. As discussed in Appendix A, such gains obey different rates: while the first decreases linearly, the second varies quadratically with the transmittance of the channel. In addition, at the receiver station, the single and double detection events are registered as random interleaved events.
In Appendix B.1, we discuss a convenient method to compute the photon gain deviation caused by the I R F S attack at a practical level.

4.2. The Non-Structured N a c k S t a t e Protocol

The argument of Point 2 implies that Eve uses only a single station, but this is not a practical restriction. Eve could use two stations, one close to Alice to detect and one close to Bob to generate fake pulses. If the quantum channel uses optical fibers (the most common practical channel for ground-based Q K D ), all Eve would need is a radio link between her two stations to “catch up” with the quantum link. Even if we assume a low source rate of 1 MHz, the time delay between pulses is only one microsecond, which can be compensated using a 600-m link (traveling in free space takes two microseconds; travel in fiber takes three microseconds). Any practical Q K D system will operate over distances greater than 600 m, making it entirely feasible for Eve to detect both pulses of a pair before sending her fake state to Bob using a second station.
However, there is no reason why each pair has to be sent in a consecutive manner. We call this protocol the non-structured n a c k s t a t e . If Alice were to send a burst of the first states of each pair, followed by a burst of the second states of each pair, she would create a separation between the pairs equal to the length of the bursts without reducing the pulse rate. Consider a 100-km fiber optic link; Alice could send the first states of each pair for 500 microseconds, followed by the second state of each pair for the next 500 microseconds, with Bob re-choosing the same basis for both 500-microsecond bursts. Because the 500-microsecond delay is at least the full travel time in the quantum channel, Eve would always be forced to fake the first state of each pair before receiving the second. If there is no issue with this approach, the authors can use it to justify Point 2, which in turn justifies Point 1.

4.3. Faking Double Detection Events

Another scenario for the eavesdropper is to fake double detection events. After all, we might ask why Eve cannot fake double detection events while she remains hidden in the channel. First of all, let us recall that Alice knows which biqubits contain parallel or orthogonal states. Second, consider the cases depicted in Table 2. Suppose Alice has sent the ( | 0 Z , | 0 Z ) biqubit to Bob. The first pulse reaches Eve’s station, who measures it with the X (or Z) basis, but the second pulse arrives as a vacuum state either by the effect of the quantum channel, the detection system or the photon source. As a result, Eve gets a single detection event. Now, Eve decides to fake the second state, but she realizes that there are six possibilities to fake the ( | 0 Z , | 0 Z ) biqubit; such cases are listed in Table 2. Additionally, one of those cases is erroneous because no orthogonal measurement can be derived from parallel states. In this example, ( | 1 Z , | 0 Z ) cannot be obtained from ( | 0 Z , | 0 Z ) . Similarly, ( | 0 Z , | 0 Z ) cannot be derived from ( | 1 Z , | 0 Z ) . As a consequence, if Eve tries to fake a double detection event, she will produce a bit error of 1 6 . In this case, a bit error is produced when Bob announces a double matching event, but Alice expects a double non-matching event or vice versa.
According to [22], Bob’s visibility of Alice’s quantum state is computed as V A B = P ( s i g n a l ) P ( t o t a l ) where P ( s i g n a l ) = T A B × η × V o p t and P ( t o t a l ) = T A B × η + ( 1 T A B × η ) × 2 × Y 0 . Here, V o p t is the optical visibility with a perfect source and detectors; η is the probability of detecting the photon when it arrives; T A B is the transmittance between Alice and Bob; and Y 0 is the background noise. For realistic experimental parameters: α = 0.25 dB· km 1 , η = 0.3 , Y 0 = 10 4 and V o p t = 0.99 . Figure 4 shows the visibility as a function of the distance.
On the other hand, the Q B E R in B B 84 can be computed as Q B E R = p e p e + p c , where p c ( p e ) is the probability to get, correctly or erroneously, the quantum bit sent by Alice, respectively. If we write such probabilities as a function of the optical visibility V, we have p c = ( 1 + V ) / 2 and p e = ( 1 V ) / 2 .
We discussed p c ( p e ) for double detection events in Appendix C. Therefore, p c = p c 2 p c 2 + p e 2 and p e = p e 2 p c 2 + p e 2 , and we derived the Q B E R of the parallel and orthogonal states as Q B E R = ( 1 V ) 2 ( 1 V ) 2 + ( 1 + V ) 2 .
If we compare the Q B E R of double detection events produced by the quantum channel against the 1 6 error rate caused by the eavesdropper, we find that the maximum secure distance for detecting the I R F S attack when the eavesdropper fakes double detection events is 176 km, which is within the range of the B B 84 key rate, as is shown in Figure 4.

5. Discussion

5.1. D e c o y S t a t e and the N a c k S t a t e Protocol

At first glance, the n a c k s t a t e protocol seems to be similar to the d e c o y s t a t e protocol. However, they differ due to some main issues. For example, the states of the d e c o y s t a t e protocol are B B 84 non-orthogonal states, which produce two photon distributions that differ from each other with respect to the expected photon number of the source ( μ 1 μ 2 ).
Thus, in the d e c o y s t a t e protocol, single detection events come from non-orthogonal states. As described by Hoi-Kwong Lo, if Eve lets an abnormally high fraction of multiphotons reach Bob’s station, then decoy states, which have a high weight of multiphotons, will have an abnormally high transmission probability [23]. Unfortunately, d e c o y s t a t e Q K D is vulnerable to the I R F S attack [13,20]. On the other hand, in the n a c k s t a t e protocol, Alice interleaves randomly parallel and orthogonal quantum states. Unlike the d e c o y s t a t e protocol, in the n a c k s t a t e , the photon source uses a unique μ value. However, single and double detection events come from parallel and orthogonal states randomly.

5.2. Measurement Device-Independent Q K D

In [17], a Q K D system that is intended to be an independent measurement device has been introduced. Implementations of this approach have been demonstrated in [24,25]. However, [24] requires several additional optical components different from the B B 84 protocol, and [25] relies on decoy states. Since Q K D must be as device independent as possible, adding hardware to the system may aggravate it. In contrast, the n a c k s t a t e protocol relies on the hardware of the original B B 84 protocol, which has been extensively studied.
Other protocols have been designed to resist the I R F S attack: varying randomly the efficiency of the detectors [26], monitoring a rate of coincidence detection at a pair of single photon detectors [27] or simply adding watchdogs detectors [28]. However, the n a c k s t a t e protocol exhibits two main advantages:
  • The protocol uses the same optical equipment as the B B 84 . It does not use any other extra hardware;
  • The protocol or its dual protocol, the a c k Q K D , could be used to detect other attacks, such as the Photon Number Splitting attack ( P N S ) [19].
Thus, the n a c k s t a t e protocol would be useful to design a more secure and efficient Q K D protocol.

6. Conclusions

The Intercept Resend with Faked (blinding) States ( I R F S ) attack is detected by the n a c k s t a t e protocol using the gain of single and double detection events. The protocol uses the same optical hardware of the B B 84 protocol, and it can be implemented in most Q K D systems as a software module application.
Although double detection events represent a small fraction of the total detection events, they are useful to detect the I R F S attack. In addition, the smaller Q B E R can be useful in future implementations to distill secret bits at longer distances.

Author Contributions

All authors contributed equally to this work. Luis Adrian Lizama-Pérez conceived the n a c k s t a t e protocol. José Mauricio López analyzed, discussed and improved the protocol. Eduardo De Carlos López analyzed the protocol and contributed with discussion to the work presented in this paper. All authors discussed the results and implications and commented on the manuscript at all stages. All authors have read and approved the final manuscript.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A. The Gain of Detection Events

In Table A1 (upper part), the symbol Q ( + ) represents the gain of the single detection events. According to [15], the gain of detection events is obtained from two parts: the photon source and the quantum channel. The photon source has an expected photon number μ, and it follows a Poisson distribution. On the other hand, the quantum channel presents a distribution that is computed for each i photons’ state (where i is the number of photons in each pulse) that is called yield. The gain Q i of i photons’ state is the product of the probability of Alice sending an i photons’ state (that follows a Poisson distribution) and the yield of i photons’ state (and background states). It will produce a gain at Bob’s side caused by the detection of events according to the relation Q i = Y i μ i i ! e μ where Y i is the yield of i photons’ state.
Table A1. The gain of the single (non-empty) and empty pulses, Q ( + ) and Q ( ) , respectively, where μ is the expected photon number of the source and Y 0 is the background noise. Here, η B T and η E T are the overall efficiency of Bob and Eve, respectively. In the I R F S attack, Eve remains undetected provided she meets the condition η E T ln ( 2 e μ η B T Y 0 1 ) μ . At the bottom, we show the gain of the double ( + , + ) detection events, which is written as Q ( + , + ) , and the gain of single ( ± , ) detection events is represented as Q ( ± , ) . In the I R F S attack, half of Eve’s biqubits can be effectively forwarded to Bob’s detectors. The “·” symbol denotes multiplication inside the Q ( ± , ) relation. The factor of 1/2 is a result of Bob using an active basis choice, forcing Eve to blind his detector when his basis differs from her own (half the time), and since each pair of pulses is detected in the same basis, Eve will always blind Bob for both pulses or neither pulses, resulting in the same factor 1/2 for both single and double detection events.
Table A1. The gain of the single (non-empty) and empty pulses, Q ( + ) and Q ( ) , respectively, where μ is the expected photon number of the source and Y 0 is the background noise. Here, η B T and η E T are the overall efficiency of Bob and Eve, respectively. In the I R F S attack, Eve remains undetected provided she meets the condition η E T ln ( 2 e μ η B T Y 0 1 ) μ . At the bottom, we show the gain of the double ( + , + ) detection events, which is written as Q ( + , + ) , and the gain of single ( ± , ) detection events is represented as Q ( ± , ) . In the I R F S attack, half of Eve’s biqubits can be effectively forwarded to Bob’s detectors. The “·” symbol denotes multiplication inside the Q ( ± , ) relation. The factor of 1/2 is a result of Bob using an active basis choice, forcing Eve to blind his detector when his basis differs from her own (half the time), and since each pair of pulses is detected in the same basis, Eve will always blind Bob for both pulses or neither pulses, resulting in the same factor 1/2 for both single and double detection events.
Gain Alice Alice Bob Eve Bob
Q ( ) e μ e μ η B T Y 0 -
Q ( + ) 1 e μ Y 0 + 1 e μ η B T 1 2 ( Y 0 + 1 e μ η E T )
Q ( , ) e 2 μ ( e μ η B T Y 0 ) 2 -
Q ( ± , ) 2 e μ · 2 ( e μ η B T Y 0 ) · ( e μ η E T Y 0 ) ·
( 1 e μ ) ( Y 0 + 1 e μ η B T ) ( Y 0 + 1 e μ η E T )
Q ( + , + ) ( 1 e μ ) 2 ( Y 0 + 1 e μ η B T ) 2 1 2 ( Y 0 + 1 e μ η E T ) 2
The yield Y i is computed across the following steps:
  • The fiber channel transmittance between Alice and Bob is written as T A B = 10 α l 10 where α is the loss coefficient measured in dB/km, and the length l is measured in km. Furthermore, the local transmittance at Bob’s side η B is written as t B · η D where t B is the internal transmittance of optical components and η D is the quantum efficiency of Bob’s detectors. Then, the overall transmission and detection efficiency at Bob’s side η B T is computed as η B T = t B · η D · T A B and typically η B T ranges 10 3 [15];
  • The transmittance η i of i photons’ state at Bob’s, that is η B T i = 1 ( 1 η B T ) i for i = 0 , 1 , . . . , assuming independence between the i photons of the i photons’ state;
  • The yield Y i of the i photons’ state is obtained from two sources, the background noise ( Y 0 ) and the true signal. Assuming that the background counts are independent from the signal photon detection, Y i is given by Y i = Y 0 + η B T i Y 0 η B T i . However, assuming Y 0 small (around 10 5 ) and η B T 10 3 , the above equation can be reduced to Y i Y 0 + η B T i .
The overall gain Q ( + ) is the summation of each Q i contribution, thus Q ( + ) = i = 1 Q i = i = 1 Y i μ i i ! e μ , which leads to the relation Y 0 + 1 e μ η B T . Finally, the Quantum Bit Error Rate ( Q B E R ) between Alice and Bob has been derived in [15] through the relation Q B E R A B = 0.5 Y 0 + e d ( 1 e μ η B T ) Y 0 + 1 e μ η B T , where e d is the error probability of the detector ( e d 10 2 ).
In order to obtain the gain of double detection events Q ( , ) , Q ( ± , ) and Q ( + , + ) , we assume that each gain is independent of the other, that is Q ( , ) = Q ( ) × Q ( ) , Q ( + , ) = Q ( + ) × Q ( ) , Q ( + , ) Q ( , + ) and Q ( + , + ) = Q ( + ) × Q ( + ) . From the previous discussion, we have that the gain of the double detection events decreases quadratically Q ( + , + ) Q ( + ) 2 . In practical implementations of Q K D , the single-matching events have the order of 10 5 , while the double matching events reach the order of 10 10 .

Appendix B. The IRFS Attack and Quantum Channel Substitution

The eavesdropper would try to adjust the two gains, from single and double detection events applying a quantum channel substitution and adjusting it to a specific transmittance. We define the Quantum Photon Error Gain ( Q P E G or simply Δ Q ) as the deviation from the reference gain that is caused by Eve’s apparatus at Bob’s receiver station when she performs the I R F S attack. In normal conditions, it is expected that Δ Q 0 , ideally for the single and the double detection events.
We represent the Q P E G of double ( + , + ) detection events as Δ Q ( + , + ) , while the Q P E G of single ( ± , ) detection events is written as Δ Q ( ± , ) . Δ Q ( + , + ) is computed as the difference Q ( + , + ) A B Q ( + , + ) E B where the symbol ( + , + ) A B defines the reference gain of the double detection events and ( + , + ) E B denotes the gain of the double detection events at Bob’s side, but in the presence of Eve. Similarly, Δ Q ( ± , ) as Q ( ± , ) A B Q ( ± , ) E B , where we use the sub-index of ( ± , ) A B and ( ± , ) E B with the same purpose.
Using the relations of Table A1, it is possible to establish if the eavesdropper can fulfill simultaneously the conditions Δ Q ( + , + ) = 0 and Δ Q ( ± , ) = 0 . Let the eavesdropper adjust freely η B T and η E T . Thus, Eve’s goal is to make Δ Q ( + , + ) A B = Δ Q ( + , + ) E B and Δ Q ( ± , ) A B = Δ Q ( ± , ) E B . We get the following equation system:
2 ( e μ η B T Y 0 ) ( Y 0 + 1 e μ η B T ) = ( e μ η E T Y 0 ) ( Y 0 + 1 e μ η E T )
( Y 0 + 1 e μ η B T ) 2 = 1 2 ( Y 0 + 1 e μ η E T ) 2
Solving the system for η E T , we obtain ln Y 0 μ and ln ( 1 + Y 0 ) μ , which cannot be satisfied in practice. This is true because the second relation yields η E T negative, and the first relation cannot be fulfilled for typical parameters, e.g., Y 0 = 10 5 , μ = 0.1 produces η E T = 1.15 . Consider also the cases depicted in Figure B1.
Figure B1. The y-axis shows the deviation from the reference gain. The upper and bottom left graphs correspond to double detections, while the right graphs represent single detections. Assuming that η B T = 0.001 and Eve uses η E T = 0.0014 , she achieves in (a), Δ Q ( + , + ) = 0 , however, in (b), Δ Q ( ± , ) 0 . Conversely, if Eve adjusts η E T = 0.002 , she gets in (d) Δ Q ( ± , ) = 0 , but in (c), she causes simultaneously that Δ Q ( + , + ) 0 .
Figure B1. The y-axis shows the deviation from the reference gain. The upper and bottom left graphs correspond to double detections, while the right graphs represent single detections. Assuming that η B T = 0.001 and Eve uses η E T = 0.0014 , she achieves in (a), Δ Q ( + , + ) = 0 , however, in (b), Δ Q ( ± , ) 0 . Conversely, if Eve adjusts η E T = 0.002 , she gets in (d) Δ Q ( ± , ) = 0 , but in (c), she causes simultaneously that Δ Q ( + , + ) 0 .
Entropy 19 00004 g005

Appendix B.1. The Photon and the Vacuum Ratios

In this section, we will introduce a convenient method to detect the presence of the eavesdropper without requiring one to compute deviations from the reference gain, that is Δ Q ( + , + ) = 0 or Δ Q ( ± , ) = 0 . For this purpose, let us define the photon ratio R as the relation between the gains Q E B Q A B where the subscript E B denotes the presence of the eavesdropper and A B indicates its absence. For double detection events, we represent R as Q ( + , + ) E B Q ( + , + ) A B , while Q ( ± , ) E B Q ( ± , ) A B for single detection events. In addition, we will define the vacuum ratio r as e μ η E T Y 0 e μ η B T Y 0 .
If the eavesdropper adjusts the channel to achieve Q ( + , + ) A B = Q ( + , + ) E B , then Equation (B2) is satisfied. We get that R ( ± , ) = r 2 , but r = e μ η E T Y 0 e μ η B T Y 0 and η E T η B T ; thus, r 1 and R ( ± , ) 1 2 . To discard Eve’s presence, we do not need to check that Δ Q ( ± , ) = 0 , but it must be verified that R ( ± , ) > 1 2 . Conversely, if Eve modifies the channel to achieve Q ( ± , ) A B = Q ( ± , ) E B , we get that R ( + , + ) = 2 r 2 . Since, r 1 , we have that the I R F S attack causes that R ( + , + ) 2 . To be sure that the system is safe against the I R F S attack, we do not need to check that Δ Q ( + , + ) = 0 , but it is equivalent to verify that R ( + , + ) < 2 .

Appendix C. The QBER of One-Photon States

As mentioned before, in the n a c k s t a t e protocol, the great majority of the pulses that Alice sends to Bob behave as B B 84 signal pulses. Each time Bob applies a compatible basis measurement, the result, either from single detection or double detection, is useful as in B B 84 . Thus, for practical purposes, the n a c k s t a t e protocol has an efficiency comparable to the B B 84 . Nevertheless, we must expect a partial reduction of the bit rate, because Alice reduces the optical pulse rate to avoid the eavesdropper to register double detection events. In this manner, Eve is detected if she waits for double detection events before she can forward them.
The rate of the double detection event is small because it decreases quadratically. However, at the same time, it is very remarkable that the Q B E R of the double matching detection events from parallel and orthogonal states also decreases quadratically. To see this, let us recall that in the B B 84 protocol, the probability to get the correct bit is p c = ( 1 + V ) / 2 , and the probability to obtain an erroneous bit is p e = ( 1 V ) / 2 , where V is the visibility of the optical system. To calculate the Q B E R of the one-photon states, the relation Q B E R = p e / ( p e + p c ) is applied [29].
Now, suppose Alice sends the two parallel states ( | 1 Z , | 1 Z ) to Bob who measures them using the Z basis. Those states are depicted in Figure C1a. The probability to get the two states ( | 1 Z , | 1 Z ) is p c 2 , and the probability to get the opposite values ( | 0 Z , | 0 Z ) is p e 2 , Case II of Figure C1a. Since the measurement cases ( | 0 Z , | 1 Z ) and ( | 1 Z , | 0 Z ) , Cases III and IV of Figure C1a, are always discarded because they are non-matching cases, the final probabilities are p c p a r a l l e l = p c 2 p c 2 + p e 2 and p e p a r a l l e l = p e 2 p c 2 + p e 2 . The same reasoning can be applied to the orthogonal biqubits case depicted in Figure C1b.
Figure C1. The Q B E R of parallel and orthogonal states: Cases III and IV of (a,b) can be discarded by Alice, so they do not produce errors.
Figure C1. The Q B E R of parallel and orthogonal states: Cases III and IV of (a,b) can be discarded by Alice, so they do not produce errors.
Entropy 19 00004 g006
Those relations lead us to the Q B E R of the parallel and orthogonal states Q B E R = ( 1 V ) 2 ( 1 V ) 2 + ( 1 + V ) 2 . Figure C2 illustrates the Q B E R of one-photon states of such protocols. Since the Q B E R of the n a c k s a t e is lower than the B B 84 , it is interesting to consider that future technologies could increase the double detection gain. Although there is not yet a formal derivation of the secret key rate for double detection events, it would be expected that the small Q B E R would lead to reaching longer Q K D distances.
Figure C2. The n a c k s t a t e protocol uses pairs of parallel and orthogonal states. The Q B E R of parallel and orthogonal states is derived using the probabilities of two consecutive B B 84 measurements.
Figure C2. The n a c k s t a t e protocol uses pairs of parallel and orthogonal states. The Q B E R of parallel and orthogonal states is derived using the probabilities of two consecutive B B 84 measurements.
Entropy 19 00004 g007

References

  1. Bennett, C.H. Quantum cryptography: Public key distribution and coin tossing. In Proceddings of the 1984 International Conference on Computer System and Signal Processing, Bangalore, India, 10–19 December 1984.
  2. Van Assche, G. Quantum Cryptography and Secret-Key Distillation; Cambridge University Press: Cambridge, UK, 2006. [Google Scholar]
  3. Hughes, R.; Nordholt, J.; Rarity, J. Summary of Implementation Schemes for Quantum Key Distribution and Quantum Cryptography—A Quantum Information Science and Technology Roadmap. Available online: http://qist.lanl.gov/pdfs/6.5-continuous.pdf (accessed on 19 December 2016).
  4. Bennett, C.H.; Bessette, F.; Brassard, G.; Salvail, L.; Smolin, J. Experimental quantum cryptography. J. Cryptol. 1992, 5, 3–28. [Google Scholar] [CrossRef]
  5. Fung, C.F.; Qi, B.; Tamaki, K.; Lo, H. Phase-remapping attack in practical quantum-key-distribution systems. Phys. Rev. A 2007, 75, 032314. [Google Scholar] [CrossRef]
  6. Xu, F.; Qi, B.; Lo, H. Experimental demonstration of phase-remapping attack in a practical quantum key distribution system. New J. Phys. 2010, 12, 113026. [Google Scholar] [CrossRef]
  7. Makarov, V.; Hjelme, D.R. Faked states attack on quantum cryptosystems. J. Mod. Opt. 2005, 52, 691–705. [Google Scholar] [CrossRef]
  8. Makarov, V.; Anisimov, A.; Skaar, J. Effects of detector efficiency mismatch on security of quantum cryptosystems. Phys. Rev. A 2006, 74, 022313. [Google Scholar] [CrossRef]
  9. Makarov, V.; Skaar, J. Faked states attack using detector efficiency mismatch on SARG04, phase-time, DPSK, and Ekert protocols. Quantum Inf. Comput. 2008, 8, 622–635. [Google Scholar]
  10. Qi, B.; Fung, C.F.; Lo, H.; Ma, X. Time-shift attack in practical quantum cryptosystems. arXiv, 2005; arXiv:quant-ph/0512080. [Google Scholar]
  11. Lydersen, L.; Wiechers, C.; Wittmann, C.; Elser, D.; Skaar, J.; Makarov, V. Hacking commercial quantum cryptography systems by tailored bright illumination. Nat. Photonics 2010, 4, 686–689. [Google Scholar] [CrossRef]
  12. Gerhardt, I.; Liu, Q.; Lamas-Linares, A.; Skaar, J.; Kurtsiefer, C.; Makarov, V. Full-field implementation of a perfect eavesdropper on a quantum cryptography system. Nat. Commun. 2011, 2, 349. [Google Scholar] [CrossRef] [PubMed]
  13. Wiechers, C.; Lydersen, L.; Wittmann, C.; Elser, D.; Skaar, J.; Marquardt, C.; Makarov, V.; Leuchs, G. After-gate attack on a quantum cryptosystem. New J. Phys. 2011, 13, 013043. [Google Scholar] [CrossRef]
  14. Weier, H.; Krauss, H.; Rau, M.; Fuerst, M.; Nauerth, S.; Weinfurter, H. Quantum eavesdropping without interception: An attack exploiting the dead time of single-photon detectors. New J. Phys. 2011, 13, 073024. [Google Scholar] [CrossRef]
  15. Ma, X.; Qi, B.; Zhao, Y.; Lo, H. Practical decoy state for quantum key distribution. Phys. Rev. A 2005, 72, 012326. [Google Scholar] [CrossRef]
  16. Hughes, R.; Nordholt, J. Refining quantum cryptography. Science 2011, 333, 1584–1586. [Google Scholar] [CrossRef] [PubMed]
  17. Lo, H.; Curty, M.; Qi, B. Measurement-device-independent quantum key distribution. Phys. Rev. Lett. 2012, 108, 130503. [Google Scholar] [CrossRef] [PubMed]
  18. Lizama, L.; López, J.M.; De Carlos, E.; Venegas-Andraca, S.E. Enhancing quantum key distribution (QKD) to address quantum hacking. Procedia Technol. 2012, 3, 80–88. [Google Scholar] [CrossRef]
  19. Lizama-Pérez, L.A.; López, J.M.; De Carlos-López, E.; Venegas-Andraca, S.E. Quantum Flows for Secret Key Distribution in the Presence of the Photon Number Splitting Attack. Entropy 2014, 16, 3121–3135. [Google Scholar] [CrossRef]
  20. Sun, S.; Jiang, M.; Ma, X.; Li, C.; Liang, L. Hacking on decoy-state quantum key distribution system with partial phase randomization. Sci. Rep. 2014, 4, 013043. [Google Scholar] [CrossRef] [PubMed]
  21. Song, T.; Qin, S.; Wen, Q.; Wang, Y.; Jia, H. Finite-key security analyses on passive decoy-state QKD protocols with different unstable sources. Sci. Rep. 2015, 5, 735–753. [Google Scholar] [CrossRef] [PubMed]
  22. Collins, D.; Gisin, N.; De Riedmatten, H. Quantum relays for long distance quantum cryptography. J. Mod. Opt. 2005, 52, 735–753. [Google Scholar] [CrossRef]
  23. Lo, H.; Ma, X.; Chen, K. Decoy state quantum key distribution. Phys. Rev. Lett. 2005, 94, 230504. [Google Scholar] [CrossRef] [PubMed]
  24. Rubenok, A.; Slater, J.A.; Chan, P.; Lucio-Martinez, I.; Tittel, W. A quantum key distribution system immune to detector attacks. arXiv, 2012; arXiv:1204.0738. [Google Scholar]
  25. Xu, F.; Curty, M.; Qi, B.; Lo, H.-K. Measurement-device-independent quantum cryptography. IEEE J. Sel. Top. Quantum Electron. 2015, 21, 148–158. [Google Scholar]
  26. Lim, C.C.W.; Walenta, N.; Legré, M.; Gisin, N.; Zbinden, H. Random variation of detector efficiency: A countermeasure against detector blinding attacks for quantum key distribution. IEEE J. Sel. Top. Quantum Electron. 2015, 21, 192–196. [Google Scholar] [CrossRef]
  27. Honjo, T.; Fujiwara, M.; Shimizu, K.; Tamaki, K.; Miki, S.; Yamashita, T.; Terai, H.; Wang, Z.; Sasaki, M. Countermeasure against tailored bright illumination attack for DPS-QKD. Opt. Express 2013, 21, 2667–2673. [Google Scholar] [CrossRef] [PubMed]
  28. Jain, N.; Stiller, B.; Khan, I.; Elser, D.; Marquardt, C.; Leuchs, G. Attacks on practical quantum key distribution systems (and how to prevent them). Contemp. Phys. 2016, 57, 366–387. [Google Scholar] [CrossRef]
  29. Jeong, Y.; Kim, Y.-S.; Kim, Y.-H. Effects of depolarizing quantum channels on BB84 and SARG04 quantum cryptography protocols. Laser Phys. 2011, 21, 1438–1442. [Google Scholar] [CrossRef]
Figure 1. The Intercept Resend ( I R ) attack against the B B 84 produces a detectable Quantum Bit Error Rate ( Q B E R ) of 25%. In the figure, Alice sends a | 0 Z state to Bob. However, Eve is in the middle of the quantum channel, and she applies the X basis measurement getting | 1 X . Thus, she prepares a copy of such a state, and she resends it to Bob, who obtains | 1 Z because he used the Z basis measurement. This introduces a secret bit error because Alice expects that Bob obtained | 0 Z .
Figure 1. The Intercept Resend ( I R ) attack against the B B 84 produces a detectable Quantum Bit Error Rate ( Q B E R ) of 25%. In the figure, Alice sends a | 0 Z state to Bob. However, Eve is in the middle of the quantum channel, and she applies the X basis measurement getting | 1 X . Thus, she prepares a copy of such a state, and she resends it to Bob, who obtains | 1 Z because he used the Z basis measurement. This introduces a secret bit error because Alice expects that Bob obtained | 0 Z .
Entropy 19 00004 g001
Figure 2. In the quantum blinding Intercept Resend with Faked States ( I R F S ) attack, Eve uses the same optical receiver unit as Bob to detect Alice’s states in a random basis. Then, she prepares those quantum states, but she sends her results to Bob as bright light pulses instead of quantum pulses. (a) Bob uses the same basis as Eve; (b) Bob and Eve’s basis are opposite.
Figure 2. In the quantum blinding Intercept Resend with Faked States ( I R F S ) attack, Eve uses the same optical receiver unit as Bob to detect Alice’s states in a random basis. Then, she prepares those quantum states, but she sends her results to Bob as bright light pulses instead of quantum pulses. (a) Bob uses the same basis as Eve; (b) Bob and Eve’s basis are opposite.
Entropy 19 00004 g002
Figure 3. We represent the quantum states as black dots in a simplified Bloch sphere over two dimensions. The quantum measurement bases X and Z are illustrated here as a horizontal and a vertical line, respectively. In this representation, two concentric circles define the order in which the states are prepared and sent. Accordingly, the inner circle state contains the state that is first sent, and the outer circle state is prepared and transmitted. As discussed in [19], the non-orthogonal states are useful to detect the Photon Number Splitting ( P N S ) attack; an example is shown in (a). In the n a c k s t a t e protocol, Alice chooses randomly two consecutive parallel states as the case depicted in (c) ( | 1 Z , | 1 Z ) . They produce a compatible measurement if Bob chooses, X for | i X or Z for | i Z where i = 0 , 1 . We sketch in (b) the case of quantum orthogonal states. Two cases are possible here { ( | 0 X , | 1 X ) , ( | 0 Z , | 1 Z ) } .
Figure 3. We represent the quantum states as black dots in a simplified Bloch sphere over two dimensions. The quantum measurement bases X and Z are illustrated here as a horizontal and a vertical line, respectively. In this representation, two concentric circles define the order in which the states are prepared and sent. Accordingly, the inner circle state contains the state that is first sent, and the outer circle state is prepared and transmitted. As discussed in [19], the non-orthogonal states are useful to detect the Photon Number Splitting ( P N S ) attack; an example is shown in (a). In the n a c k s t a t e protocol, Alice chooses randomly two consecutive parallel states as the case depicted in (c) ( | 1 Z , | 1 Z ) . They produce a compatible measurement if Bob chooses, X for | i X or Z for | i Z where i = 0 , 1 . We sketch in (b) the case of quantum orthogonal states. Two cases are possible here { ( | 0 X , | 1 X ) , ( | 0 Z , | 1 Z ) } .
Entropy 19 00004 g003
Figure 4. The error rate of double detection events caused by the I R F S attack is 1 6 . If it is compared against the Q B E R of the quantum channel, the maximum secure distance to detect the I R F S attack is 176 km. In the presence of the I R F S attack, perfect visibility and zero dark counts are assumed in the link between Alice and Eve and from her to Bob.
Figure 4. The error rate of double detection events caused by the I R F S attack is 1 6 . If it is compared against the Q B E R of the quantum channel, the maximum secure distance to detect the I R F S attack is 176 km. In the presence of the I R F S attack, perfect visibility and zero dark counts are assumed in the link between Alice and Eve and from her to Bob.
Entropy 19 00004 g004
Table 1. We show the n a c k s t a t e protocol running in absence of errors at the quantum channel, all of the possible measurement results at Bob’s detectors. We assume that Alice sends the biqubits ( | 0 X , | 1 X ) and ( | 1 Z , | 1 Z ) ; then, all of the possible measurement results at Bob’s detectors are written. According to Bob’s basis selection, we show the detection event and Bob’s corresponding advertisement over the public channel. Notice that Bob announces publicly the number of the single detections inside the biqubit, first or second.
Table 1. We show the n a c k s t a t e protocol running in absence of errors at the quantum channel, all of the possible measurement results at Bob’s detectors. We assume that Alice sends the biqubits ( | 0 X , | 1 X ) and ( | 1 Z , | 1 Z ) ; then, all of the possible measurement results at Bob’s detectors are written. According to Bob’s basis selection, we show the detection event and Bob’s corresponding advertisement over the public channel. Notice that Bob announces publicly the number of the single detections inside the biqubit, first or second.
Alice’s BiqubitBob’s BasisDetection EventPublic DisclosureDescription
X ( | 0 X , | 1 X ) X, ( 2 n M )compatible double non-matching, useful as two compatible single detection events
X ( | 0 X , ) X, ( S 1 )compatible single matching, useful
X ( , | 1 X ) X, ( S 2 )compatible single matching, useful
X ( , ) X, Lostbiqubit lost
Z ( | 0 Z , | 0 Z ) Z, ( 2 M )non-compatible double matching, useless
Z ( | 1 Z , | 1 Z ) Z, ( 2 M )non-compatible double matching, useless
( | 0 X , | 1 X ) Z ( | 0 Z , | 1 Z ) Z, ( 2 n M )non-compatible double non-matching, useless
Z ( | 1 Z , | 0 Z ) Z, ( 2 n M )non-compatible double non-matching, useless
Z ( | 0 Z , ) Z, ( S 1 )non-compatible single matching, useless
Z ( | 1 Z , ) Z, ( S 1 )non-compatible single matching, useless
Z ( , | 0 Z ) Z, ( S 2 )non-compatible single matching, useless
Z ( , | 1 Z ) Z, ( S 2 )non-compatible single matching, useless
Z ( , ) Z, Lostbiqubit lost
Z ( | 1 Z , | 1 Z ) Z, ( 2 M )compatible double matching, useful
Z ( | 1 Z , ) Z, ( S 1 )compatible single matching, useful
Z ( , | 1 Z ) Z, ( S 2 )compatible single matching, useful
Z ( , ) Z, Lostbiqubit lost
X ( | 0 X , | 0 X ) X, ( 2 M )non-compatible double matching, useless
X ( | 1 X , | 1 X ) X, ( 2 M )non-compatible double matching, useless
( | 1 Z , | 1 Z ) X ( | 0 X , | 1 X ) X, ( 2 n M )non-compatible double non-matching, useless
X ( | 1 X , | 0 X ) X, ( 2 n M )non-compatible double non-matching, useless
X ( | 0 X , ) X, ( S 1 )non-compatible single matching, useless
X ( | 1 X , ) X, ( S 1 )non-compatible single matching, useless
X ( , | 0 X ) X, ( S 2 )non-compatible single matching, useless
X ( , | 1 X ) X, ( S 2 )non-compatible single matching, useless
X ( , ) X, Lostbiqubit lost
Table 2. After Eve detects the first state of a biqubit, she tries to fake the second state. However, there exist six possible states, but one of them is erroneous, so she introduces an error probability of 1 6 . Here, we show the six choices for ( | 0 Z , | 0 Z ) and ( | 1 Z , | 0 Z ) biqubits.
Table 2. After Eve detects the first state of a biqubit, she tries to fake the second state. However, there exist six possible states, but one of them is erroneous, so she introduces an error probability of 1 6 . Here, we show the six choices for ( | 0 Z , | 0 Z ) and ( | 1 Z , | 0 Z ) biqubits.
Alice’s BiqubitEve’s BasisEve’s DetectionForwarded DatesEve’s Result
( | 0 Z , | 0 Z ) Z ( , | 0 Z ) ( | 0 Z , | 0 Z ) hidden
( | 1 Z , | 0 Z ) detected
X ( , | 0 X ) ( | 0 X , | 0 X ) hidden
( | 1 X , | 0 X ) hidden
( , | 1 X ) ( | 0 X , | 1 X ) hidden
( | 1 X , | 1 X ) hidden
( | 1 Z , | 0 Z ) Z ( , | 0 Z ) ( | 0 Z , | 0 Z ) detected
( | 1 Z , | 0 Z ) hidden
X ( , | 0 X ) ( | 0 X , | 0 X ) hidden
( | 1 X , | 0 X ) hidden
( , | 1 X ) ( | 0 X , | 1 X ) hidden
( | 1 X , | 1 X ) hidden

Share and Cite

MDPI and ACS Style

Lizama-Pérez, L.A.; López, J.M.; De Carlos López, E. Quantum Key Distribution in the Presence of the Intercept-Resend with Faked States Attack. Entropy 2017, 19, 4. https://doi.org/10.3390/e19010004

AMA Style

Lizama-Pérez LA, López JM, De Carlos López E. Quantum Key Distribution in the Presence of the Intercept-Resend with Faked States Attack. Entropy. 2017; 19(1):4. https://doi.org/10.3390/e19010004

Chicago/Turabian Style

Lizama-Pérez, Luis Adrian, José Mauricio López, and Eduardo De Carlos López. 2017. "Quantum Key Distribution in the Presence of the Intercept-Resend with Faked States Attack" Entropy 19, no. 1: 4. https://doi.org/10.3390/e19010004

APA Style

Lizama-Pérez, L. A., López, J. M., & De Carlos López, E. (2017). Quantum Key Distribution in the Presence of the Intercept-Resend with Faked States Attack. Entropy, 19(1), 4. https://doi.org/10.3390/e19010004

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop