By the same authors

From the same journal

From the same journal

General immunity and superadditivity of two-way Gaussian quantum cryptography

Research output: Contribution to journalArticle

Full text download(s)

Published copy (DOI)

Author(s)

Department/unit(s)

Publication details

JournalScientific Reports
DateE-pub ahead of print - 1 Mar 2016
DatePublished (current) - 1 Mar 2016
Volume6
Early online date1/03/16
Original languageEnglish

Abstract

We consider two-way continuous-variable quantum key distribution, studying its security against general eavesdropping strategies. Assuming the asymptotic limit of many signals exchanged, we prove that two-way Gaussian protocols are immune to coherent attacks. More precisely we show the general superadditivity of the two-way security thresholds, which are proven to be higher than the corresponding one-way counterparts in all cases. We perform the security analysis first reducing the general eavesdropping to a two-mode coherent Gaussian attack, and then showing that the superadditivity is achieved by exploiting the random on/off switching of the two-way quantum communication. This allows the parties to choose the appropriate communication instances to prepare the key, accordingly to the tomography of the quantum channel. The random opening and closing
of the circuit represents, in fact, an additional degree of freedom allowing the parties to convert, a posteriori, the two-mode correlations of the eavesdropping into noise. The eavesdropper is assumed to have no access to the on/off switching and, indeed, cannot adapt her attack. We explicitly prove that this mechanism enhances the security performance, no matter if the eavesdropper performs collective or coherent attacks.

Bibliographical note

This content is made available by the publisher under a Creative Commons Attribution Licence. This means that a user may copy, distribute and display the resource providing that they give credit. Users must adhere to the terms of the licence.

Discover related content

Find related publications, people, projects, datasets and more using interactive charts.

View graph of relations