Abstract
Many quantum key distribution QKD analyses examine the link security in a subset of the full Hilbert space that is available to describe the system. In reality, information about the photon state can be embedded in correlations between the polarization space and other dimensions of the full Hilbert space in such a way that Eve can determine the polarization of a photon without affecting it. This paper uses the concept of suitability Hockney et al. “Suitability versus Fidelity for Rating Single Photon Guns” to quantify the available information for Eve to exploit, and demonstrate how it is possible for Alice and Bob to fool themselves into thinking they have a highly secure link.
Similar content being viewed by others
References
G. M. Hockney, P. Kok, and J. P. Dowling, Suitability Versus Fidelity for Rating Single-Photon Guns, arXiv:quant-ph/0206198.
C. H. Bennett and G. Brassard, in Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, New York, December 10–12, 1984, pp. 175–179; C. H. Bennett and G. Brassard, IBM Tech. Disclosure Bull. 28, 3153–3163 (1985).
A. Muller J. Breguet N. Gisin (1993) Europhysics Lett. 23 383–388 Occurrence Handle1:CAS:528:DyaK2cXisFKisLY%3D
J. Breguet A. Muller N. Gisin (1994) J. Modern Optics 41 2405–2412
A. Muller H. Zbinden N. Gisin (1995) Nature 378 449–449 Occurrence Handle10.1038/378449a0 Occurrence Handle1:CAS:528:DyaK2MXps1ymtLg%3D
C.H. Bennett (1992) Phys. Rev. Lett. 68 3121–3124 Occurrence Handle10.1103/PhysRevLett.68.3121 Occurrence Handle10045619 Occurrence HandleMR1163546
P. Townsend, J. G. Rarity, and P. R. Tapster, Electron. Lett. 29, 634–639 (1993); P. Townsend, J. Rarity, and P. Tapster, Electron. Lett. 29, 1291–2193 (1993).
R. Hughes, G. G. Luther, G. L. Morgan, and C. Simmons, Lect. Notes Comput. Sci. 1109, 329–342 (1996); R. Hughes, G. Morgan, and C. Peterson, J. Modern Opt. 47, 533–547; R. Hughes, G. Morgan, and C. Peterson, J. Modern Optics 47, 533–547 (2000).
J. Breguet N. Gisin (1995) Optics Lett. 20 1447–1449
Y. Mazurenko R. Giust J. P. Goedgebuer (1997) Opt Commun. 133 87–92 Occurrence Handle10.1016/S0030-4018(96)00436-1
P. C. Sun Y. Mazurenko Y. Fainman (1995) Opt. Lett. 20 1062–1063
S. N. Molotkov (1998) J. Exp. Theor. Phys. 87 288–293 Occurrence Handle10.1134/1.558658
T. Jennewein, U. Achleitner, G. Weihs, H. Weinfurter, and A. Zeilinger, Rev. Sci. Inst. 71, 1675–1680 (2000); quant-ph/9912118.
D. Naik C. Peterson A. White A. Berglund P. Kwiat (2000) Phys. Rev. Lett. 84 4733–4736 Occurrence Handle10.1103/PhysRevLett.84.4733 Occurrence Handle1:CAS:528:DC%2BD3cXjsVWgsLY%3D Occurrence Handle10990783
J. D. Franson (1989) Phys. Rev. Lett. 62 2205–2208 Occurrence Handle10.1103/PhysRevLett.62.2205 Occurrence Handle10039885
G. Ribordy J. Brendel J. D. Gautier N. Gisin H. Zbinden (2001) Phys. Rev. A. 63 012309 Occurrence Handle10.1103/PhysRevA.63.012309
W. Tittel J. Brendel H. Zbinden N. Gisin (2000) Phys. Rev. Lett. 84 4737–4740 Occurrence Handle10.1103/PhysRevLett.84.4737 Occurrence Handle1:CAS:528:DC%2BD3cXjsVWgsb4%3D Occurrence Handle10990784
D. Mayers and A. Yao, in Proceedings of the 39th IEEE Conference on Foundations of Computer Science (1998); D. Mayers, in Advances in Cryptography: Proceedings of Crypto 96, Lecture notes in Computer Science, vol. 1109, Springer-Verlag, 1996, pp. 343–357.
N. Lutkenhaus (1999) PRA 59 3301 Occurrence Handle10.1103/PhysRevA.59.3301 Occurrence Handle1:CAS:528:DyaK1MXivVShtbY%3D
G. Gilbert and M. Hamrick, “Practical Quantum Cryptography: A Comprehensive Analysis”, arXiv:quant-ph/ 0009027.
N. Gisin G. Ribordy W. Tittel H. Zbinden (2002) Rev. Mod. Phys. 74 145–195 Occurrence Handle10.1103/RevModPhys.74.145
G. Gilbert M. Hamrick (2002) Algorithmica 34 314–339 Occurrence Handle10.1007/s00453-002-0977-2
L. Allen, M. W. Beijersberen, R. J. C. Spreeeuw, and J. P. Woerdman, Phys. Rev. A 45, 8185 (1992); L. Allen, M. J. Padgett, M. Babiker, Prog. Opt. 39, 291 (1999).
P. Kok, H. Lee, and J. P. Dowling, arXiv:quant-ph/0202046.
C. H. Bennett G. Brassard C. Crepeau U. M. Maurer (1995) IEEE Trans. Inf. Theor. 40 1915–1923 Occurrence Handle10.1109/18.476316
C. K. Hong Z. Y. Ou L. Mandel (1987) Phys. Rev. Lett. 59 2044 Occurrence Handle10.1103/PhysRevLett.59.2044 Occurrence Handle1:CAS:528:DyaL1cXmt1Kisw%3D%3D Occurrence Handle10035403
Author information
Authors and Affiliations
Corresponding author
Additional information
PACS:03.67.Dd; 03.67.HK; 42.50.-p.
Rights and permissions
About this article
Cite this article
Jackson, D.J., Hockney, G.M. Securing QKD Links in the Full Hilbert Space. Quantum Inf Process 4, 35–47 (2005). https://doi.org/10.1007/s11128-005-3194-5
Received:
Accepted:
Issue Date:
DOI: https://doi.org/10.1007/s11128-005-3194-5