scispace - formally typeset
Search or ask a question
Proceedings ArticleDOI

Eavesdropping of Two-Way Coherent-State Quantum Cryptography via Gaussian Quantum Cloning Machines

TL;DR: This protocol consists of a two-way quantum communication between Alice and Bob, where Alice encodes secret information via a random phase-space displacement of a coherent state and its security against a specific class of individual attacks which are based on combinations of Gaussian quantum cloning machines is studied.
Abstract: We consider one of the quantum key distribution protocols recently introduced in Ref. [Pirandola et al., Nature Phys. 4, 726 (2008)]. This protocol consists of a two-way quantum communication between Alice and Bob, where Alice encodes secret information via a random phase-space displacement of a coherent state. In particular, we study its security against a specific class of individual attacks which are based on combinations of Gaussian quantum cloning machines.

Content maybe subject to copyright    Report

Citations
More filters
Posted ContentDOI
05 Jan 2022
TL;DR: Security in Quantum side Channel (SQSC) framework has been proposed in which Shifting and Binary Conversions (SBC) algorithm has been implemented and attains good performance to a greater extent.
Abstract: Network security is critical for both personal and business networks. Most homes with high – speed internet have one or more wireless routers, which can be hacked if not adequately secured. Even though, if more number of solutions were addressed for security, still the security is challenging one in networks.Quantum Key Distribution was proposed to enhance security in the past literature. In this QKD, the secret message was converted in to Q-bits. Through this side channel, there is a chance to hack the data by the Eavesdropper which cannot be identified by the receiver side. So, receiver will send the acknowledgement to the sender for sending encrypted data in the classical channel.From this, the hacker can easily fetch the encrypted data from the classical channel. To address this issue, Security in Quantum side Channel (SQSC) framework has been proposed in which Shifting and Binary Conversions (SBC) algorithm has been implemented. This proposed security model attains good performance to a greater extent.

1 citations

References
More filters
Journal ArticleDOI
TL;DR: This protocol is shown to be equivalent to an entanglement purification protocol using CSS codes followed by key extraction, and is thus secure against any eavesdropping strategy.
Abstract: We assess the security of a quantum key distribution protocol relying on the transmission of Gaussian-modulated coherent states and homodyne detection. This protocol is shown to be equivalent to an entanglement purification protocol using CSS codes followed by key extraction, and is thus secure against any eavesdropping strategy.

41 citations


"Eavesdropping of Two-Way Coherent-S..." refers background in this paper

  • ...Recently [1, 2], we have shown how two-way quantum communication can profitably be exploited to enhance the security of continuous variable quantum key distribution [3, 4, 5, 6]....

    [...]

Journal ArticleDOI
TL;DR: In this article, the authors consider the problem of privacy in direct communications, showing how quantum mechanics can be useful to guarantee a certain level of confidentiality, and analyze the degree of privacy of this technique against a broader class of attacks, including non-Gaussian eavesdropping.
Abstract: We consider the problem of privacy in direct communications, showing how quantum mechanics can be useful to guarantee a certain level of confidentiality. In particular, we review a continuous variable approach recently proposed by us [Pirandola et al., Europhys. Lett., vol. 84, pp. 20013-1-20013-6, 2008]. Here, we analyze the degree of privacy of this technique against a broader class of attacks, which includes non-Gaussian eavesdropping.

23 citations

DOI
05 Sep 2008
TL;DR: In this paper, the authors considered asymmetric strategies where the Gaussian interactions can be different and classically correlated, and they proved that the enhancement of security still holds when the two-way protocols are used in direct reconciliation.
Abstract: Recently, we have shown the advantages of two-way quantum communications in continuous variable quantum cryptography. Thanks to this new approach, two honest users can achieve a non-trivial security enhancement as long as the Gaussian interactions of an eavesdropper are independent and identical. In this work, we consider asymmetric strategies where the Gaussian interactions can be different and classically correlated. For several attacks of this kind, we prove that the enhancement of security still holds when the two-way protocols are used in direct reconciliation.

2 citations