C. Ottaviani, G. Spedalieri, S. Braunstein, S. Pirandola
{"title":"CV-MDI-QKD with coherent state: beyond one-mode Gaussian attacks","authors":"C. Ottaviani, G. Spedalieri, S. Braunstein, S. Pirandola","doi":"10.1088/2633-1357/ab92f6","DOIUrl":null,"url":null,"abstract":"A general security proof of continuous variable (CV) measurement device independent (MDI) quantum key distribution (QKD) should not be automatically reduced to the analysis of one-mode Gaussian attacks (in particular, independent entangling-cloner attacks). To stress this point, the present work provides a very simple (almost trivial) argument, showing that there are an infinite number of two-mode Gaussian attacks that cannot be reduced to or simulated by one-mode Gaussian attacks. This result further confirms that the security analysis of CV-MDI-QKD must generally involve a careful minimization over two-mode attacks as originally performed in (Pirandola et al, 2015 Nature Photon. 9, 397–402; arXiv:1312.4104 (2013)).","PeriodicalId":93771,"journal":{"name":"IOP SciNotes","volume":" ","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2020-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IOP SciNotes","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1088/2633-1357/ab92f6","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
A general security proof of continuous variable (CV) measurement device independent (MDI) quantum key distribution (QKD) should not be automatically reduced to the analysis of one-mode Gaussian attacks (in particular, independent entangling-cloner attacks). To stress this point, the present work provides a very simple (almost trivial) argument, showing that there are an infinite number of two-mode Gaussian attacks that cannot be reduced to or simulated by one-mode Gaussian attacks. This result further confirms that the security analysis of CV-MDI-QKD must generally involve a careful minimization over two-mode attacks as originally performed in (Pirandola et al, 2015 Nature Photon. 9, 397–402; arXiv:1312.4104 (2013)).