Skip to main content
Log in

Quantum Key Distribution with Several Cloning Attacks via a Depolarizing Channel

  • Published:
Journal of Russian Laser Research Aims and scope

Abstract

We study the effect of many eavesdroppers cloning attacks via a depolarizing channel of the Bennett– Brassard cryptographic protocol on the quantum error and the mutual information between honest parties. We compute the quantum error and the mutual information for an arbitrary number of attacks. We prove that the quantum error, the secret information, and the secured/unsecured transition depend strongly on the eavesdroppers’ number, their angle of attack, and the depolarizing parameter. However, when all the eavesdroppers attack with an identical angle the quantum error increases with increase in the eavesdroppers’ number and/or decrease of the depolarizing parameter p for 0 ≤ p ≤ 0.165, while for p > 0.165, the lost information is greater than the mutual information exchanged between honest parties independently of the eavesdropper number and the angle of attack.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. C. H. Bennett and G. Brassard, in: Proceeding of the IEEE International Conference on Computer, Systems, and Signal Processing (Bangalore, India), IEEE Press, New York (1984).

  2. D. Bruß, D. P. DiVincenzo, A. Eckert, et al., Phys. Rev. A, 57, 2368 (1998).

    Article  ADS  Google Scholar 

  3. N. J. Cerf, Phys. Rev. Lett., 84, 4497 (2000).

    Article  ADS  Google Scholar 

  4. V. Bužek and M. Hillery, Phys. Rev. A, 54, 1844 (1996).

    Article  MathSciNet  ADS  Google Scholar 

  5. V. Bužek, S. L. Braunstein, M. Hillery, and D. Bruß, Phys. Rev. A, 56, 3446 (1997).

    Article  ADS  Google Scholar 

  6. L. P. Lamoureux, H. Bechmann-Pasquinucci, N. J. Cerf, et al., Phys. Rev. A, 73, 032304 (2006).

    Article  ADS  Google Scholar 

  7. H. Ez-Zahraouy and A. Benyoussef, Int. J. Mod. Phys. B, 23, 4755 (2009).

    Article  ADS  MATH  Google Scholar 

  8. M. Dehmani, H. Ez-Zahraouy, and A. Benyoussef, J. Comput. Sci., 6, 684 (2010).

    Article  Google Scholar 

  9. Iyed Ben Slimen, Olfa Trabelsi, Houria Rezig, et al., J. Comput. Sci., 3, 424 (2007).

  10. V. Scarani, A. Acin, G. Ribordy, and N. Gisin, Phys. Rev. Lett., 92, 057901 (2004).

    Article  ADS  Google Scholar 

  11. Youn-Chang Jeong, Yong-Su Kim, and Yoon-Ho Kim, “Effects of depolarizing quantum channels on BB84 and SARG04 quantum cryptography protocols,” arXiv:1002.2285v1 [quant-ph].

  12. M. Dehmani, M. Errahmani, H. Ez-Zahraouy, and A. Benyoussef, Phys. Scr., 86, 015803 (2012).

    Article  ADS  Google Scholar 

  13. M. Hendrych, PHD Thesis, “Experimental quantum cryptography,” Palacký University (2002).

  14. K. Moon, Error Correction Coding: Mathematical Methods and Algorithms, Wiley, Blackwell (2005).

    Book  Google Scholar 

  15. C. Paquin, PHD Thesis, “Les codes correcteurs Quantiques et leurs applications Cryptographiques,” Universit´e de Montrèal (2000).

  16. C. Adami and N. J. Cerf, Phys. Rev. A, 56, 3470 (1997).

    Article  MathSciNet  ADS  Google Scholar 

  17. P. W. Shor, and J. Preskill, Phys. Rev. Lett., 85, 441 (2000).

    Article  ADS  Google Scholar 

  18. K. Tamaki, M. Koashi, and N. Imoto, Phys. Rev. Lett., 90, 167904 (2003).

    Article  ADS  Google Scholar 

  19. V. Scarani, Helle Bechmann-Pasquinucci, N. J. Cerf, et al., Rev. Mod. Phys., 81, 1301 (2009).

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hamid Ez-Zahraouy.

Additional information

Manuscript submitted by the authors in English on April 28, 2015.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Dehmani, M., Ez-Zahraouy, H. & Benyoussef, A. Quantum Key Distribution with Several Cloning Attacks via a Depolarizing Channel. J Russ Laser Res 36, 228–236 (2015). https://doi.org/10.1007/s10946-015-9495-y

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10946-015-9495-y

Keywords

Navigation