Skip to main content
Log in

Securing QKD Links in the Full Hilbert Space

  • Published:
Quantum Information Processing Aims and scope Submit manuscript

Abstract

Many quantum key distribution QKD analyses examine the link security in a subset of the full Hilbert space that is available to describe the system. In reality, information about the photon state can be embedded in correlations between the polarization space and other dimensions of the full Hilbert space in such a way that Eve can determine the polarization of a photon without affecting it. This paper uses the concept of suitability Hockney et al. “Suitability versus Fidelity for Rating Single Photon Guns” to quantify the available information for Eve to exploit, and demonstrate how it is possible for Alice and Bob to fool themselves into thinking they have a highly secure link.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. G. M. Hockney, P. Kok, and J. P. Dowling, Suitability Versus Fidelity for Rating Single-Photon Guns, arXiv:quant-ph/0206198.

  2. C. H. Bennett and G. Brassard, in Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, New York, December 10–12, 1984, pp. 175–179; C. H. Bennett and G. Brassard, IBM Tech. Disclosure Bull. 28, 3153–3163 (1985).

  3. A. Muller J. Breguet N. Gisin (1993) Europhysics Lett. 23 383–388 Occurrence Handle1:CAS:528:DyaK2cXisFKisLY%3D

    CAS  Google Scholar 

  4. J. Breguet A. Muller N. Gisin (1994) J. Modern Optics 41 2405–2412

    Google Scholar 

  5. A. Muller H. Zbinden N. Gisin (1995) Nature 378 449–449 Occurrence Handle10.1038/378449a0 Occurrence Handle1:CAS:528:DyaK2MXps1ymtLg%3D

    Article  CAS  Google Scholar 

  6. C.H. Bennett (1992) Phys. Rev. Lett. 68 3121–3124 Occurrence Handle10.1103/PhysRevLett.68.3121 Occurrence Handle10045619 Occurrence HandleMR1163546

    Article  PubMed  MathSciNet  Google Scholar 

  7. P. Townsend, J. G. Rarity, and P. R. Tapster, Electron. Lett. 29, 634–639 (1993); P. Townsend, J. Rarity, and P. Tapster, Electron. Lett. 29, 1291–2193 (1993).

  8. R. Hughes, G. G. Luther, G. L. Morgan, and C. Simmons, Lect. Notes Comput. Sci. 1109, 329–342 (1996); R. Hughes, G. Morgan, and C. Peterson, J. Modern Opt. 47, 533–547; R. Hughes, G. Morgan, and C. Peterson, J. Modern Optics 47, 533–547 (2000).

  9. J. Breguet N. Gisin (1995) Optics Lett. 20 1447–1449

    Google Scholar 

  10. Y. Mazurenko R. Giust J. P. Goedgebuer (1997) Opt Commun. 133 87–92 Occurrence Handle10.1016/S0030-4018(96)00436-1

    Article  Google Scholar 

  11. P. C. Sun Y. Mazurenko Y. Fainman (1995) Opt. Lett. 20 1062–1063

    Google Scholar 

  12. S. N. Molotkov (1998) J. Exp. Theor. Phys. 87 288–293 Occurrence Handle10.1134/1.558658

    Article  Google Scholar 

  13. T. Jennewein, U. Achleitner, G. Weihs, H. Weinfurter, and A. Zeilinger, Rev. Sci. Inst. 71, 1675–1680 (2000); quant-ph/9912118.

    Google Scholar 

  14. D. Naik C. Peterson A. White A. Berglund P. Kwiat (2000) Phys. Rev. Lett. 84 4733–4736 Occurrence Handle10.1103/PhysRevLett.84.4733 Occurrence Handle1:CAS:528:DC%2BD3cXjsVWgsLY%3D Occurrence Handle10990783

    Article  CAS  PubMed  Google Scholar 

  15. J. D. Franson (1989) Phys. Rev. Lett. 62 2205–2208 Occurrence Handle10.1103/PhysRevLett.62.2205 Occurrence Handle10039885

    Article  PubMed  Google Scholar 

  16. G. Ribordy J. Brendel J. D. Gautier N. Gisin H. Zbinden (2001) Phys. Rev. A. 63 012309 Occurrence Handle10.1103/PhysRevA.63.012309

    Article  Google Scholar 

  17. W. Tittel J. Brendel H. Zbinden N. Gisin (2000) Phys. Rev. Lett. 84 4737–4740 Occurrence Handle10.1103/PhysRevLett.84.4737 Occurrence Handle1:CAS:528:DC%2BD3cXjsVWgsb4%3D Occurrence Handle10990784

    Article  CAS  PubMed  Google Scholar 

  18. D. Mayers and A. Yao, in Proceedings of the 39th IEEE Conference on Foundations of Computer Science (1998); D. Mayers, in Advances in Cryptography: Proceedings of Crypto 96, Lecture notes in Computer Science, vol. 1109, Springer-Verlag, 1996, pp. 343–357.

  19. N. Lutkenhaus (1999) PRA 59 3301 Occurrence Handle10.1103/PhysRevA.59.3301 Occurrence Handle1:CAS:528:DyaK1MXivVShtbY%3D

    Article  CAS  Google Scholar 

  20. G. Gilbert and M. Hamrick, “Practical Quantum Cryptography: A Comprehensive Analysis”, arXiv:quant-ph/ 0009027.

  21. N. Gisin G. Ribordy W. Tittel H. Zbinden (2002) Rev. Mod. Phys. 74 145–195 Occurrence Handle10.1103/RevModPhys.74.145

    Article  Google Scholar 

  22. G. Gilbert M. Hamrick (2002) Algorithmica 34 314–339 Occurrence Handle10.1007/s00453-002-0977-2

    Article  Google Scholar 

  23. L. Allen, M. W. Beijersberen, R. J. C. Spreeeuw, and J. P. Woerdman, Phys. Rev. A 45, 8185 (1992); L. Allen, M. J. Padgett, M. Babiker, Prog. Opt. 39, 291 (1999).

  24. P. Kok, H. Lee, and J. P. Dowling, arXiv:quant-ph/0202046.

  25. C. H. Bennett G. Brassard C. Crepeau U. M. Maurer (1995) IEEE Trans. Inf. Theor. 40 1915–1923 Occurrence Handle10.1109/18.476316

    Article  Google Scholar 

  26. C. K. Hong Z. Y. Ou L. Mandel (1987) Phys. Rev. Lett. 59 2044 Occurrence Handle10.1103/PhysRevLett.59.2044 Occurrence Handle1:CAS:528:DyaL1cXmt1Kisw%3D%3D Occurrence Handle10035403

    Article  CAS  PubMed  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Deborah J. Jackson.

Additional information

PACS:03.67.Dd; 03.67.HK; 42.50.-p.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Jackson, D.J., Hockney, G.M. Securing QKD Links in the Full Hilbert Space. Quantum Inf Process 4, 35–47 (2005). https://doi.org/10.1007/s11128-005-3194-5

Download citation

  • Received:

  • Accepted:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11128-005-3194-5

Keywords

Navigation