Quantum cryptography or, more precisely, quantum key distribution (QKD), is one of the advanced areas in the field of quantum technologies. The confidentiality of keys distributed with the use of QKD protocols is guaranteed by the fundamental laws of quantum mechanics. This paper is devoted to the decoy state method, a countermeasure against vulnerabilities caused by the use of coherent states of light for QKD protocols whose security is proved under the assumption of single-photon states. We give a formal security proof of the decoy state method against all possible attacks. We compare two widely known attacks on multiphoton pulses: photon-number splitting and beam splitting. Finally, we discuss the equivalence of polarization and phase coding.
A precise security analysis of practical quantum key distribution (QKD) systems is an important step for improving their performance. Here we consider a class of quantum soft filtering operations, which generalizes the unambiguous state discrimination (USD) technique. These operations can be applied as a basis for a security analysis of the original coherent one-way (COW) QKD protocol since their application interpolates between beam-splitting (BS) and USD attacks. We demonstrate that a zero-error attack based on quantum soft filtering operations gives a larger amount of the information for Eve at a given level of losses. We calculate the Eve information as a function of the channel length. The efficiency of the proposed attack highly depends on the level of the monitoring under the maintenance of the statistics of control (decoy) states, and best-case results are achieved in the case of the absence of maintenance of control state statistics. Our results form additional requirements for the analysis of practical QKD systems based on the COW QKD protocol and its variants by providing an upper bound on the security.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.