The role of the side channels in the continuous-variable quantum key distribution is studied. It is shown how the information leakage through a side channel from the trusted sender station increases the vulnerability of the protocols to the eavesdropping in the main quantum communication channel. Moreover, the untrusted noise infusion by an eavesdropper on the trusted receiving side breaks the security even for a purely attenuating main quantum channel. As a method to compensate for the effect of the side-channel leakage on the sender side, we suggest several types of manipulations on the side-channel input. It is shown that by applying the modulated coherent light on the input of the side channel that is optimally correlated to the modulation on the main signal and optionally, introducing additional squeezing in the case of the squeezed-state protocol, the negative influence of the lossy side channel on the sender side can be completely removed. For the trusted receiving side, the method of optimal monitoring of the residual noise from the side-channel noise infusion is suggested and shown to be able to completely eliminate the presence of the noisy side channel. We therefore prove that the side-channel effects can be completely removed using feasible operations if the trusted parties access the respective parts of the side channels. PACS numbers: 03.67.Hk, 03.67.Dd
I. INTRODUCTIONQuantum key distribution (QKD) [1, 2] is a major communication application of quantum information theory aiming at the development of protocols for establishing secure channels protected by the laws of quantum physics. Such channels can then be used to share a secure key for classical symmetrical cryptographic systems. Recently, continuous-variable (CV) [3] protocols of QKD (see [4] for review) were developed and implemented on the basis of squeezed [5][6][7] or coherent [8][9][10][11][12] states. The security of CV QKD protocols in the case of Gaussian modulation was then shown against collective attacks in the presence of channel noise [13,14], which also implies the security against the most general coherent attacks [15,16].CV QKD protocols, however, suffer from various imperfections. The most threatening are the untrusted (i.e., being under full control of a potential eavesdropper) quantum channels, which are inclined to losses due to the attenuation and can add excess noise in the link. Such noise can also be detection noise indistinguishable from the effect of the channel. In security analysis it is then supposed that all the channel imperfections are due to the presence on an eavesdropper. It was an important step in the development of CV QKD when with the use of reverse reconciliation it was shown possible to establish asymptotically secure key transmission upon any pure channel loss [9], while noise remains limiting to the security of the protocols.However, the insecure quantum channel is not neces- * Electronic address: ivan.derkach01@upol.cz †