Skip to main content
Log in

Robustness of Quantum Cryptography Systems with Phase–Time Coding against Active Probing Attacks

  • ATOMS, MOLECULES, OPTICS
  • Published:
Journal of Experimental and Theoretical Physics Aims and scope Submit manuscript

Abstract

The robustness of a quantum cryptography system is considered that uses a protocol with phase–time coding on attenuated coherent states. This protocol admits an effective fiber optic implementation, which does not require a phase modulator on the receiver side and adjusting the polarization state at the input of the receiver side. The absence of a phase modulator on the receiver side excludes a side channel of information leakage associated with the active probing of the phase modulator at the receiving station, thus making the system more robust against such attacks compared to other systems. The nonstrict single-photon nature of information states, as well as information leakage through side channels, is considered by the generalized decoy state method, which takes into account joint collective measurements of information quantum states and quantum states in side channels. An estimate for the secret key length is obtained that is expressed only in terms of observed quantities at the receiving station and the parameters of quantum states in side channels.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1.

Similar content being viewed by others

REFERENCES

  1. C. H. Bennett and G. Brassard, in Proceedings of the IEEE International Conference on Comp., Systems and Signal Processing, Bangalore, India, 1984, p. 175.

  2. R. Renner, PhD Thesis (ETH Zürich, 2005); arXiv:quant-ph/0512258.

  3. M. Tomamichel, Ch. Ci Wen Lim, N. Gisin, and R. Renner, arXiv: 1103.4130v2 (2011); Nat. Commun. 3, 1 (2012).

    Article  Google Scholar 

  4. G. Brassard, N. Lütkenhaus, T. Mor, and B. C. Sanders, Phys. Rev. Lett. 85, 1330 (2000).

    Article  ADS  Google Scholar 

  5. Won-Young Hwang, arXiv:[quant-ph]/0211153.

  6. Xiang-Bin Wang, Phys. Rev. Lett. 94, 230503 (2005).

    Article  ADS  Google Scholar 

  7. Hoi-Kwong Lo, Xiongfeng Ma, and Kai Chen, Phys. Rev. Lett. 94, 230504 (2005).

    Article  ADS  Google Scholar 

  8. Xiongfeng Ma, Bing Qi, Yi Zhao, and Hoi-Kwong Lo, arXiv: [quant-ph]/0503005.

  9. S. N. Molotkov, Laser Phys. Lett. 16, 075203 (2019).

    Article  ADS  Google Scholar 

  10. S. N. Molotkov, J. Exp. Theor. Phys. 106, 1 (2008).

    Article  ADS  Google Scholar 

  11. S. N. Molotkov, Laser Phys. Lett. 16, 035203 (2019).

    Article  ADS  Google Scholar 

  12. A. S. Holevo, Probl. Inf. Transmis. 9, 177 (1973).

    Google Scholar 

  13. A. S. Kholevo, Usp. Mat. Nauk 53, 193 (1998).

    Article  Google Scholar 

  14. A. S. Holevo, Quantum Systems, Channels, Information, Vol. 16 of de Gruyter Studies in Mathematical Physics (MTsNMO, Moscow 2010; Walter de Gruyter, Berlin, 2013).

Download references

ACKNOWLEDGMENTS

I am grateful to my colleagues from the Academy of Cryptography of the Russian Federation for discussions and support, as well as to I.M. Arbekov and S.P. Kulik for numerous interesting discussions and remarks that helped to improve the article.

Funding

This work was supported by the Russian Science Foundation, project no. 16-12-00015 (continued).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. N. Molotkov.

Additional information

Translated by I. Nikitin

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Molotkov, S.N. Robustness of Quantum Cryptography Systems with Phase–Time Coding against Active Probing Attacks. J. Exp. Theor. Phys. 131, 877–894 (2020). https://doi.org/10.1134/S1063776120110138

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1134/S1063776120110138

Navigation