Photon-Number-Splitting versus Cloning Attacks in Practical Implementations of the Bennett-Brassard 1984 protocol for Quantum Cryptography

Armand Niederberger,Valerio Scarani,Nicolas Gisin
DOI: https://doi.org/10.1103/PhysRevA.71.042316
2005-04-15
Abstract: In practical quantum cryptography, the source sometimes produces multi-photon pulses, thus enabling the eavesdropper Eve to perform the powerful photon-number-splitting (PNS) attack. Recently, it was shown by Curty and Lutkenhaus [Phys. Rev. A 69, 042321 (2004)] that the PNS attack is not always the optimal attack when two photons are present: if errors are present in the correlations Alice-Bob and if Eve cannot modify Bob's detection efficiency, Eve gains a larger amount of information using another attack based on a 2->3 cloning machine. In this work, we extend this analysis to all distances Alice-Bob. We identify a new incoherent 2->3 cloning attack which performs better than those described before. Using it, we confirm that, in the presence of errors, Eve's better strategy uses 2->3 cloning attacks instead of the PNS. However, this improvement is very small for the implementations of the Bennett-Brassard 1984 (BB84) protocol. Thus, the existence of these new attacks is conceptually interesting but basically does not change the value of the security parameters of BB84. The main results are valid both for Poissonian and sub-Poissonian sources.
Quantum Physics
What problem does this paper attempt to address?
The main problem that this paper attempts to solve is about the construction and classification of Perfect Delaunay Polytopes. Specifically, the authors explore the following issues: 1. **Definition and Properties of Perfect Delaunay Polytopes**: - A Delaunay polytope \( D \) is called "perfect" if there exists a unique circumscribed ellipsoid \( E \) such that the interior of the ellipsoid contains no lattice points and the surface of the ellipsoid contains only the vertices of \( D \). - Perfect Delaunay polytopes are closely related to the so - called "perfect inhomogeneous forms", which are uniquely determined by the above - mentioned circumscribed "empty ellipsoid" up to a scale factor. 2. **Construction of Infinite Sequences**: - The authors successfully construct some infinite sequences of perfect Delaunay polytopes. For each sequence, the polytopes have a corresponding perfect Delaunay polytope in each successive dimension starting from a certain initial dimension. - For example, they construct the G - polytope sequence \( G_d \) and the C - polytope sequence \( C_d \), starting from six - dimensional and seven - dimensional respectively, with specific symmetries and numbers of vertices. 3. **Importance of Perfect Delaunay Polytopes in Geometric and Combinatorial Structures**: - These polytopes play an important role in Voronoi and Delaunay tessellation theories, especially in the study of edge forms of L - type domains. - They are also related to strongly regular graphs and the theory of association schemes. For example, Schläfli graphs and Gosset graphs can be constructed as one - dimensional skeletons of Gosset polytopes. 4. **Specific Mathematical Expressions and Theorems**: - The paper gives specific formulas to describe the properties of these polytopes. For example, for the \( P_d^{s,k} \) polytope, its circumscribed empty ellipsoid can be defined by the following formula: \[ \phi_d^{s,k}(x)=4k(d - k(2s + 1))|x|^2+(d^2-(4k + 2s + 1)d + 4k(2s + k))(j\cdot x)^2 \] - Through a series of lemmas and theorems, the authors prove that these polytopes do satisfy the Delaunay property and are perfect. In conclusion, the main objective of this paper is to explore and construct perfect Delaunay polytopes in different dimensions and study their applications and importance in geometry, combinatorial structures and related fields.