Article ID Journal Published Year Pages File Type
1787542 Current Applied Physics 2011 4 Pages PDF
Abstract

We suggest a sophisticated attack protocol, which can be applied to the two-way deterministic quantum key distribution protocol. When more than two photons are used for a qubit, Eve picks out a photon each from the forward and the backward channel and measures whether the states of the two picked-out photons are orthogonal or the same by using the fourth order quantum interference. We describe the attack protocol, which uses an active arrangement of two Hong–Ou–Mandel interferometers combined with further quantum nondemolition measurements, beam splitters, and polarization rotator.

► We have developed a novel attack method to quantum cryptography by using Hong-Ou-Mandel interferometer. ► By using photon splitting attack method, when we split off photons from each channel, the photon polarization can be compared. ► We apply our method LM05 quantum cryptography protocol, and show that the protocol is not secure.

Related Topics
Physical Sciences and Engineering Physics and Astronomy Condensed Matter Physics
Authors
, , ,