Continuous-variable quantum cryptography with an untrusted relay: Detailed security analysis of the symmetric configuration

Carlo Ottaviani, Gaetana Spedalieri, Samuel L. Braunstein, and Stefano Pirandola
Phys. Rev. A 91, 022320 – Published 18 February 2015

Abstract

We consider the continuous-variable protocol of Pirandola et al. [arXiv:1312.4104] where the secret key is established by the measurement of an untrusted relay. In this network protocol, two authorized parties are connected to an untrusted relay by insecure quantum links. Secret correlations are generated by a continuous-variable Bell detection performed on incoming coherent states. In the present work we provide a detailed study of the symmetric configuration, where the relay is midway between the parties. We analyze symmetric eavesdropping strategies against the quantum links explicitly showing that, at fixed transmissivity and thermal noise, two-mode coherent attacks are optimal, manifestly outperforming one-mode collective attacks based on independent entangling cloners. Such an advantage is shown both in terms of security threshold and secret-key rate.

  • Figure
  • Figure
  • Figure
  • Figure
  • Figure
  • Figure
  • Figure
1 More
  • Received 1 July 2014
  • Revised 22 October 2014

DOI:https://doi.org/10.1103/PhysRevA.91.022320

©2015 American Physical Society

Authors & Affiliations

Carlo Ottaviani*, Gaetana Spedalieri, Samuel L. Braunstein, and Stefano Pirandola

  • Department of Computer Science & York Centre for Quantum Technologies, University of York, York YO10 5GH, United Kingdom

  • *carlo.ottaviani@york.ac.uk
  • stefano.pirandola@york.ac.uk

Article Text (Subscription Required)

Click to Expand

References (Subscription Required)

Click to Expand
Issue

Vol. 91, Iss. 2 — February 2015

Reuse & Permissions
Access Options
Author publication services for translation and copyediting assistance advertisement

Authorization Required


×
×

Images

×

Sign up to receive regular email alerts from Physical Review A

Log In

Cancel
×

Search


Article Lookup

Paste a citation or DOI

Enter a citation
×