Cargando…
General immunity and superadditivity of two-way Gaussian quantum cryptography
We consider two-way continuous-variable quantum key distribution, studying its security against general eavesdropping strategies. Assuming the asymptotic limit of many signals exchanged, we prove that two-way Gaussian protocols are immune to coherent attacks. More precisely we show the general super...
Autores principales: | , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Nature Publishing Group
2016
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4772010/ https://www.ncbi.nlm.nih.gov/pubmed/26928053 http://dx.doi.org/10.1038/srep22225 |
_version_ | 1782418487575052288 |
---|---|
author | Ottaviani, Carlo Pirandola, Stefano |
author_facet | Ottaviani, Carlo Pirandola, Stefano |
author_sort | Ottaviani, Carlo |
collection | PubMed |
description | We consider two-way continuous-variable quantum key distribution, studying its security against general eavesdropping strategies. Assuming the asymptotic limit of many signals exchanged, we prove that two-way Gaussian protocols are immune to coherent attacks. More precisely we show the general superadditivity of the two-way security thresholds, which are proven to be higher than the corresponding one-way counterparts in all cases. We perform the security analysis first reducing the general eavesdropping to a two-mode coherent Gaussian attack, and then showing that the superadditivity is achieved by exploiting the random on/off switching of the two-way quantum communication. This allows the parties to choose the appropriate communication instances to prepare the key, accordingly to the tomography of the quantum channel. The random opening and closing of the circuit represents, in fact, an additional degree of freedom allowing the parties to convert, a posteriori, the two-mode correlations of the eavesdropping into noise. The eavesdropper is assumed to have no access to the on/off switching and, indeed, cannot adapt her attack. We explicitly prove that this mechanism enhances the security performance, no matter if the eavesdropper performs collective or coherent attacks. |
format | Online Article Text |
id | pubmed-4772010 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2016 |
publisher | Nature Publishing Group |
record_format | MEDLINE/PubMed |
spelling | pubmed-47720102016-03-07 General immunity and superadditivity of two-way Gaussian quantum cryptography Ottaviani, Carlo Pirandola, Stefano Sci Rep Article We consider two-way continuous-variable quantum key distribution, studying its security against general eavesdropping strategies. Assuming the asymptotic limit of many signals exchanged, we prove that two-way Gaussian protocols are immune to coherent attacks. More precisely we show the general superadditivity of the two-way security thresholds, which are proven to be higher than the corresponding one-way counterparts in all cases. We perform the security analysis first reducing the general eavesdropping to a two-mode coherent Gaussian attack, and then showing that the superadditivity is achieved by exploiting the random on/off switching of the two-way quantum communication. This allows the parties to choose the appropriate communication instances to prepare the key, accordingly to the tomography of the quantum channel. The random opening and closing of the circuit represents, in fact, an additional degree of freedom allowing the parties to convert, a posteriori, the two-mode correlations of the eavesdropping into noise. The eavesdropper is assumed to have no access to the on/off switching and, indeed, cannot adapt her attack. We explicitly prove that this mechanism enhances the security performance, no matter if the eavesdropper performs collective or coherent attacks. Nature Publishing Group 2016-03-01 /pmc/articles/PMC4772010/ /pubmed/26928053 http://dx.doi.org/10.1038/srep22225 Text en Copyright © 2016, Macmillan Publishers Limited http://creativecommons.org/licenses/by/4.0/ This work is licensed under a Creative Commons Attribution 4.0 International License. The images or other third party material in this article are included in the article’s Creative Commons license, unless indicated otherwise in the credit line; if the material is not included under the Creative Commons license, users will need to obtain permission from the license holder to reproduce the material. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/ |
spellingShingle | Article Ottaviani, Carlo Pirandola, Stefano General immunity and superadditivity of two-way Gaussian quantum cryptography |
title | General immunity and superadditivity of two-way Gaussian quantum cryptography |
title_full | General immunity and superadditivity of two-way Gaussian quantum cryptography |
title_fullStr | General immunity and superadditivity of two-way Gaussian quantum cryptography |
title_full_unstemmed | General immunity and superadditivity of two-way Gaussian quantum cryptography |
title_short | General immunity and superadditivity of two-way Gaussian quantum cryptography |
title_sort | general immunity and superadditivity of two-way gaussian quantum cryptography |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4772010/ https://www.ncbi.nlm.nih.gov/pubmed/26928053 http://dx.doi.org/10.1038/srep22225 |
work_keys_str_mv | AT ottavianicarlo generalimmunityandsuperadditivityoftwowaygaussianquantumcryptography AT pirandolastefano generalimmunityandsuperadditivityoftwowaygaussianquantumcryptography |