Weak randomness seriously limits the security of quantum key distribution

Jan Bouda, Matej Pivoluska, Martin Plesch, and Colin Wilmott
Phys. Rev. A 86, 062308 – Published 7 December 2012

Abstract

In usual security proofs of quantum protocols the adversary (Eve) is expected to have full control over any quantum communication between any communicating parties (Alice and Bob). Eve is also expected to have full access to an authenticated classical channel between Alice and Bob. Unconditional security against any attack by Eve can be proved even in the realistic setting of device and channel imperfection. In this paper we show that the security of quantum key distribution protocols is ruined if one allows Eve to possess a very limited access to the random sources used by Alice. Such knowledge should always be expected in realistic experimental conditions via different side channels.

  • Figure
  • Received 13 June 2012

DOI:https://doi.org/10.1103/PhysRevA.86.062308

©2012 American Physical Society

Authors & Affiliations

Jan Bouda1,*, Matej Pivoluska1, Martin Plesch1,2, and Colin Wilmott1

  • 1Faculty of Informatics, Masaryk University, Brno, Czech Republic
  • 2Institute of Physics, Slovak Academy of Sciences, Bratislava, Slovakia

  • *Present address: Física Teòrica: Informació i Fenòmens Quàntics, Departament de Física, Universitat Autònoma de Barcelona, E-08193 Bellaterra, Barcelona, Spain.

Article Text (Subscription Required)

Click to Expand

References (Subscription Required)

Click to Expand
Issue

Vol. 86, Iss. 6 — December 2012

Reuse & Permissions
Access Options
Author publication services for translation and copyediting assistance advertisement

Authorization Required


×
×

Images

×

Sign up to receive regular email alerts from Physical Review A

Log In

Cancel
×

Search


Article Lookup

Paste a citation or DOI

Enter a citation
×