Quantum Key Distribution As a Scheme with Bernoulli Tests


Cite item

Full Text

Open Access Open Access
Restricted Access Access granted
Restricted Access Subscription Access

Abstract

A family of attacks on the BB84 protocol of quantum key distribution is explicitly constructed under which the lower bound of fundamental entropy uncertainty relations is attained in the asymptotic limit of long sequences. All attacks are parameterized by a single parameter Q, which has the meaning of error probability on the receiver side, is known to the eavesdropper, but is reliably unknown to legitimate users. The situation on the receiver side looks like a scheme with classical Bernoulli tests with unknown parameter Q. For the eavesdropper, the situation also looks like a Bernoulli scheme—tossing a coin with quantum states, where each message of the eavesdropper leads to a quantum state that is uniquely determined by the outcome of measurements on the receiver side. A statistical interpretation is given to the estimate of the error probability for Q and the key secrecy parameter εδ,n. It is shown that, for a given length n of a series of tests, the width δ of the confidence interval actually determines the accuracy of the estimate for the parameter Q and, accordingly, the key secrecy level—the value of the secrecy parameter \({\varepsilon _{\delta ,n}} = 2{e^{ - 2{\delta ^2}n}}\).

About the authors

S. N. Molotkov

Institute of Solid State Physics; Academy of Cryptography of the Russian Federation; Department of Computational Mathematics and Cybernetics

Author for correspondence.
Email: Sergei.Molotkov@gmail.com
Russian Federation, Chernogolovka, Moscow oblast, 142432; Moscow, 121552; Moscow, 119899

Supplementary files

Supplementary Files
Action
1. JATS XML

Copyright (c) 2018 Pleiades Publishing, Inc.