2017
DOI: 10.1070/qel16240
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of coherent quantum cryptography protocol vulnerability to an active beam-splitting attack

Abstract: We consider a new type of attack on a coherent quantum key distribution protocol [coherent one-way (COW) protocol]. The main idea of the attack consists in measuring individually the intercepted states and sending the rest of them unchanged. We have calculated the optimum values of the attack parameters for an arbitrary length of a channel length and compared this novel attack with a standard beam-splitting attack.

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(2 citation statements)
references
References 32 publications
(51 reference statements)
0
2
0
Order By: Relevance
“…Note that, in recent works [60][61][62][63], generalizations of the beam splitting attack for the B92, COW, and DPS protocols are considered. In these generalizations, the adversary can change the intensity of states and their further actions depend on whether they has managed to extract information from the part of the state diverted by the beam splitter.…”
Section: Beam Splitting Attackmentioning
confidence: 99%
“…Note that, in recent works [60][61][62][63], generalizations of the beam splitting attack for the B92, COW, and DPS protocols are considered. In these generalizations, the adversary can change the intensity of states and their further actions depend on whether they has managed to extract information from the part of the state diverted by the beam splitter.…”
Section: Beam Splitting Attackmentioning
confidence: 99%
“…Examples include, in particular, the distributed-phase-reference (DPR) approach [11][12][13][14][15][16][17][18][19], specifically, differential-phase-shift [11][12][13][14][15] and COW [16][17][18][19] QKD protocols. A general security proof of DPR-QKD in a realistic setting has been missing, and only particular cases have been considered [20][21][22][23][24][25][26][27][28]. This problem has been recently generally resolved, and lower bounds for a special variant of the COW protocol have been obtained [29].…”
Section: Introductionmentioning
confidence: 99%