Extended analysis of the Trojan-horse attack in quantum key distribution

Scott E. Vinay and Pieter Kok
Phys. Rev. A 97, 042335 – Published 23 April 2018

Abstract

The discrete-variable quantum key distribution protocols based on the 1984 protocol of Bennett and Brassard (BB84) are known to be secure against an eavesdropper, Eve, intercepting the flying qubits and performing any quantum operation on them. However, these protocols may still be vulnerable to side-channel attacks. We investigate the Trojan-horse side-channel attack where Eve sends her own state into Alice's apparatus and measures the reflected state to estimate the key. We prove that the separable coherent state is optimal for Eve among the class of multimode Gaussian attack states, even in the presence of thermal noise. We then provide a bound on the secret key rate in the case where Eve may use any separable state.

  • Figure
  • Figure
  • Figure
  • Received 19 January 2018
  • Revised 26 March 2018

DOI:https://doi.org/10.1103/PhysRevA.97.042335

©2018 American Physical Society

Physics Subject Headings (PhySH)

Quantum Information, Science & Technology

Authors & Affiliations

Scott E. Vinay* and Pieter Kok

  • Department of Physics and Astronomy, University of Sheffield, Sheffield S3 7RH, United Kingdom

  • *svinay1@sheffield.ac.uk
  • p.kok@sheffield.ac.uk

Article Text (Subscription Required)

Click to Expand

References (Subscription Required)

Click to Expand
Issue

Vol. 97, Iss. 4 — April 2018

Reuse & Permissions
Access Options
Author publication services for translation and copyediting assistance advertisement

Authorization Required


×
×

Images

×

Sign up to receive regular email alerts from Physical Review A

Log In

Cancel
×

Search


Article Lookup

Paste a citation or DOI

Enter a citation
×