TY - JOUR
T1 - Teleportation-based collective attacks in Gaussian quantum key distribution
AU - Tserkis, Spyros
AU - Hosseinidehaj, Nedasadat
AU - Walk, Nathan
AU - Ralph, Timothy C.
N1 - Publisher Copyright:
© 2020 authors. Published by the American Physical Society. Published by the American Physical Society under the terms of the Creative Commons Attribution 4.0 International license. Further distribution of this work must maintain attribution to the author(s) and the published article's title, journal citation, and DOI.
PY - 2020/2
Y1 - 2020/2
N2 - In Gaussian quantum key distribution eavesdropping attacks are conventionally modeled through the universal entangling cloner scheme, which is based on the premise that the whole environment is under control of the adversary, i.e., the eavesdropper purifies the system. This assumption implies that the eavesdropper has either access to an identity (noiseless) channel or an infinite amount of entanglement in order to simulate such an identity channel. In this work we challenge the necessity of this assumption and we propose a teleportation-based eavesdropping attack, where the eavesdropper is not assumed to have access to the shared channel, that represents the unavoidable noise due to the environment. Under collective measurements, this attack reaches optimality in the limit of an infinite amount of entanglement, while for finite entanglement resources it outperforms the corresponding optimal individual attack. We also calculate the minimum amount of distributed entanglement that is necessary for this eavesdropping scheme, since we consider it as the operationally critical quantity capturing the limitations of a realistic attack. We conclude that the fact that an infinite amount of entanglement is required for an optimal collective eavesdropping attack signifies the robustness of Gaussian quantum key distribution.
AB - In Gaussian quantum key distribution eavesdropping attacks are conventionally modeled through the universal entangling cloner scheme, which is based on the premise that the whole environment is under control of the adversary, i.e., the eavesdropper purifies the system. This assumption implies that the eavesdropper has either access to an identity (noiseless) channel or an infinite amount of entanglement in order to simulate such an identity channel. In this work we challenge the necessity of this assumption and we propose a teleportation-based eavesdropping attack, where the eavesdropper is not assumed to have access to the shared channel, that represents the unavoidable noise due to the environment. Under collective measurements, this attack reaches optimality in the limit of an infinite amount of entanglement, while for finite entanglement resources it outperforms the corresponding optimal individual attack. We also calculate the minimum amount of distributed entanglement that is necessary for this eavesdropping scheme, since we consider it as the operationally critical quantity capturing the limitations of a realistic attack. We conclude that the fact that an infinite amount of entanglement is required for an optimal collective eavesdropping attack signifies the robustness of Gaussian quantum key distribution.
UR - http://www.scopus.com/inward/record.url?scp=85109171675&partnerID=8YFLogxK
U2 - 10.1103/PhysRevResearch.2.013208
DO - 10.1103/PhysRevResearch.2.013208
M3 - Article
SN - 2643-1564
VL - 2
JO - Physical Review Research
JF - Physical Review Research
IS - 1
M1 - 013208
ER -