C. Ottaviani, G. Spedalieri, S. Braunstein, S. Pirandola
{"title":"具有相干态的CV-MDI-QKD:超越单模高斯攻击","authors":"C. Ottaviani, G. Spedalieri, S. Braunstein, S. Pirandola","doi":"10.1088/2633-1357/ab92f6","DOIUrl":null,"url":null,"abstract":"A general security proof of continuous variable (CV) measurement device independent (MDI) quantum key distribution (QKD) should not be automatically reduced to the analysis of one-mode Gaussian attacks (in particular, independent entangling-cloner attacks). To stress this point, the present work provides a very simple (almost trivial) argument, showing that there are an infinite number of two-mode Gaussian attacks that cannot be reduced to or simulated by one-mode Gaussian attacks. This result further confirms that the security analysis of CV-MDI-QKD must generally involve a careful minimization over two-mode attacks as originally performed in (Pirandola et al, 2015 Nature Photon. 9, 397–402; arXiv:1312.4104 (2013)).","PeriodicalId":93771,"journal":{"name":"IOP SciNotes","volume":" ","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2020-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"CV-MDI-QKD with coherent state: beyond one-mode Gaussian attacks\",\"authors\":\"C. Ottaviani, G. Spedalieri, S. Braunstein, S. Pirandola\",\"doi\":\"10.1088/2633-1357/ab92f6\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A general security proof of continuous variable (CV) measurement device independent (MDI) quantum key distribution (QKD) should not be automatically reduced to the analysis of one-mode Gaussian attacks (in particular, independent entangling-cloner attacks). To stress this point, the present work provides a very simple (almost trivial) argument, showing that there are an infinite number of two-mode Gaussian attacks that cannot be reduced to or simulated by one-mode Gaussian attacks. This result further confirms that the security analysis of CV-MDI-QKD must generally involve a careful minimization over two-mode attacks as originally performed in (Pirandola et al, 2015 Nature Photon. 9, 397–402; arXiv:1312.4104 (2013)).\",\"PeriodicalId\":93771,\"journal\":{\"name\":\"IOP SciNotes\",\"volume\":\" \",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-07-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IOP SciNotes\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1088/2633-1357/ab92f6\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IOP SciNotes","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1088/2633-1357/ab92f6","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
CV-MDI-QKD with coherent state: beyond one-mode Gaussian attacks
A general security proof of continuous variable (CV) measurement device independent (MDI) quantum key distribution (QKD) should not be automatically reduced to the analysis of one-mode Gaussian attacks (in particular, independent entangling-cloner attacks). To stress this point, the present work provides a very simple (almost trivial) argument, showing that there are an infinite number of two-mode Gaussian attacks that cannot be reduced to or simulated by one-mode Gaussian attacks. This result further confirms that the security analysis of CV-MDI-QKD must generally involve a careful minimization over two-mode attacks as originally performed in (Pirandola et al, 2015 Nature Photon. 9, 397–402; arXiv:1312.4104 (2013)).