Limits on detecting eavesdropper in QKD protocols

Pranav Subramaniam, Abhishek Parakh

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Abstract

Quantum key distribution (QKD) protocols form a natural choice for encryption in optical networks. All the QKD protocols use errors caused due to random measurements by Eve to detect her presence. In this paper, we present a fundamental limitation of using such bases to detect an eavesdropper in two QKD protocols - the BB84 and the new quantum Diffie-Hellman key exchange protocol. It is shown that the eavesdropper will go undetected in each exchange in both the protocols at least half the time.

Original languageEnglish (US)
Title of host publication2014 IEEE International Conference on Advanced Networks and Telecommunication Systems, ANTS 2014
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781479958689
DOIs
StatePublished - Jan 1 2014
Event2014 IEEE International Conference on Advanced Networks and Telecommunication Systems, ANTS 2014 - New Delhi, India
Duration: Dec 14 2014Dec 17 2014

Publication series

Name2014 IEEE International Conference on Advanced Networks and Telecommunication Systems, ANTS 2014

Other

Other2014 IEEE International Conference on Advanced Networks and Telecommunication Systems, ANTS 2014
CountryIndia
CityNew Delhi
Period12/14/1412/17/14

Fingerprint

Quantum cryptography
Fiber optic networks
Cryptography

Keywords

  • limits on eavesdropper detection
  • quantum Diffie-Hellman protocol
  • quantum cryptography

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Instrumentation

Cite this

Subramaniam, P., & Parakh, A. (2014). Limits on detecting eavesdropper in QKD protocols. In 2014 IEEE International Conference on Advanced Networks and Telecommunication Systems, ANTS 2014 [7057239] (2014 IEEE International Conference on Advanced Networks and Telecommunication Systems, ANTS 2014). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ANTS.2014.7057239

Limits on detecting eavesdropper in QKD protocols. / Subramaniam, Pranav; Parakh, Abhishek.

2014 IEEE International Conference on Advanced Networks and Telecommunication Systems, ANTS 2014. Institute of Electrical and Electronics Engineers Inc., 2014. 7057239 (2014 IEEE International Conference on Advanced Networks and Telecommunication Systems, ANTS 2014).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Subramaniam, P & Parakh, A 2014, Limits on detecting eavesdropper in QKD protocols. in 2014 IEEE International Conference on Advanced Networks and Telecommunication Systems, ANTS 2014., 7057239, 2014 IEEE International Conference on Advanced Networks and Telecommunication Systems, ANTS 2014, Institute of Electrical and Electronics Engineers Inc., 2014 IEEE International Conference on Advanced Networks and Telecommunication Systems, ANTS 2014, New Delhi, India, 12/14/14. https://doi.org/10.1109/ANTS.2014.7057239
Subramaniam P, Parakh A. Limits on detecting eavesdropper in QKD protocols. In 2014 IEEE International Conference on Advanced Networks and Telecommunication Systems, ANTS 2014. Institute of Electrical and Electronics Engineers Inc. 2014. 7057239. (2014 IEEE International Conference on Advanced Networks and Telecommunication Systems, ANTS 2014). https://doi.org/10.1109/ANTS.2014.7057239
Subramaniam, Pranav ; Parakh, Abhishek. / Limits on detecting eavesdropper in QKD protocols. 2014 IEEE International Conference on Advanced Networks and Telecommunication Systems, ANTS 2014. Institute of Electrical and Electronics Engineers Inc., 2014. (2014 IEEE International Conference on Advanced Networks and Telecommunication Systems, ANTS 2014).
@inproceedings{89c994c5324e4264b9c0fdeee94606ea,
title = "Limits on detecting eavesdropper in QKD protocols",
abstract = "Quantum key distribution (QKD) protocols form a natural choice for encryption in optical networks. All the QKD protocols use errors caused due to random measurements by Eve to detect her presence. In this paper, we present a fundamental limitation of using such bases to detect an eavesdropper in two QKD protocols - the BB84 and the new quantum Diffie-Hellman key exchange protocol. It is shown that the eavesdropper will go undetected in each exchange in both the protocols at least half the time.",
keywords = "limits on eavesdropper detection, quantum Diffie-Hellman protocol, quantum cryptography",
author = "Pranav Subramaniam and Abhishek Parakh",
year = "2014",
month = "1",
day = "1",
doi = "10.1109/ANTS.2014.7057239",
language = "English (US)",
series = "2014 IEEE International Conference on Advanced Networks and Telecommunication Systems, ANTS 2014",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
booktitle = "2014 IEEE International Conference on Advanced Networks and Telecommunication Systems, ANTS 2014",

}

TY - GEN

T1 - Limits on detecting eavesdropper in QKD protocols

AU - Subramaniam, Pranav

AU - Parakh, Abhishek

PY - 2014/1/1

Y1 - 2014/1/1

N2 - Quantum key distribution (QKD) protocols form a natural choice for encryption in optical networks. All the QKD protocols use errors caused due to random measurements by Eve to detect her presence. In this paper, we present a fundamental limitation of using such bases to detect an eavesdropper in two QKD protocols - the BB84 and the new quantum Diffie-Hellman key exchange protocol. It is shown that the eavesdropper will go undetected in each exchange in both the protocols at least half the time.

AB - Quantum key distribution (QKD) protocols form a natural choice for encryption in optical networks. All the QKD protocols use errors caused due to random measurements by Eve to detect her presence. In this paper, we present a fundamental limitation of using such bases to detect an eavesdropper in two QKD protocols - the BB84 and the new quantum Diffie-Hellman key exchange protocol. It is shown that the eavesdropper will go undetected in each exchange in both the protocols at least half the time.

KW - limits on eavesdropper detection

KW - quantum Diffie-Hellman protocol

KW - quantum cryptography

UR - http://www.scopus.com/inward/record.url?scp=84988289860&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84988289860&partnerID=8YFLogxK

U2 - 10.1109/ANTS.2014.7057239

DO - 10.1109/ANTS.2014.7057239

M3 - Conference contribution

AN - SCOPUS:84988289860

T3 - 2014 IEEE International Conference on Advanced Networks and Telecommunication Systems, ANTS 2014

BT - 2014 IEEE International Conference on Advanced Networks and Telecommunication Systems, ANTS 2014

PB - Institute of Electrical and Electronics Engineers Inc.

ER -