pith. sign in

arxiv: 1505.00053 · v2 · pith:XHQVISTPnew · submitted 2015-04-30 · 🪐 quant-ph

Necessary detection efficiencies for secure quantum key distribution and bound randomness

classification 🪐 quant-ph
keywords attackdetectionefficienciesquantumappliesbounddevice-independentdistribution
0
0 comments X
read the original abstract

In recent years, several hacking attacks have broken the security of quantum cryptography implementations by exploiting the presence of losses and the ability of the eavesdropper to tune detection efficiencies. We present a simple attack of this form that applies to any protocol in which the key is constructed from the results of untrusted measurements performed on particles coming from an insecure source or channel. Because of its generality, the attack applies to a large class of protocols, from standard prepare-and-measure to device-independent schemes. Our attack gives bounds on the critical detection efficiencies necessary for secure quantum distribution, which show that the implementation of most partly device independent solutions is, from the point of view of detection efficiency, almost as demanding as fully device-independent ones. We also show how our attack implies the existence of a form of bound randomness, namely non-local correlations in which a non-signalling eavesdropper can find out a posteriori the result of any implemented measurement.

This paper has not been read by Pith yet.

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.

Forward citations

Cited by 1 Pith paper

Reviewed papers in the Pith corpus that reference this work. Sorted by Pith novelty score.

  1. Generalized measurement incompatibility

    quant-ph 2026-05 unverdicted novelty 6.0

    Generalized partial joint-measurability of quantum measurements is equivalent to perfect classical guessing by an adversary with side information and is decidable via a single semidefinite program, producing analytica...