Eavesdropping in Semiquantum Key Distribution Protocol

Eavesdropping in Semiquantum Key Distribution Protocol
Notice: This research summary and analysis were automatically generated using AI technology. For absolute accuracy, please refer to the [Original Paper Viewer] below or the Original ArXiv Source.

In semiquantum key-distribution (Boyer et al.) Alice has the same capability as in BB84 protocol, but Bob can measure and prepare qubits only in ${|0\rangle, |1\rangle}$ basis and reflect any other qubit. We study an eavesdropping strategy on this scheme that listens to the channel in both the directions. With the same level of disturbance induced in the channel, Eve can extract more information using our two-way strategy than what can be obtained by the direct application of one-way eavesdropping in BB84.


💡 Research Summary

The paper investigates a novel eavesdropping attack on the semi‑quantum key distribution (SQKD) protocol originally proposed by Boyer et al. In SQKD, Alice possesses full quantum capabilities identical to those in the BB84 protocol, while Bob is severely limited: he can only measure and prepare qubits in the computational basis {|0⟩,|1⟩} and must simply reflect any qubit that arrives in another basis. This asymmetry creates a two‑stage quantum channel: Alice sends a qubit to Bob, Bob either measures it (if it is in the Z‑basis) or reflects it, and the qubit returns to Alice.

Traditional security analyses of BB84 assume a one‑way eavesdropper (Eve) who interacts only with the forward channel (Alice → Bob). Eve’s optimal individual attack consists of measuring each qubit with probability p, thereby inducing a disturbance D in the channel. The mutual information I₁(D) that Eve gains is a well‑known function of D; higher disturbance yields less information.

The authors propose a “two‑way” or “bidirectional” eavesdropping strategy that exploits the return leg of the SQKD protocol. Eve inserts the same probabilistic measurement–resend operation on both the forward (Alice → Bob) and backward (Bob → Alice) transmissions. Each interaction independently introduces a disturbance D₁ and D₂, both governed by the same parameter p. The overall channel disturbance observed by Alice and Bob is the average D = (D₁ + D₂)/2, which can be kept identical to the disturbance level of a conventional one‑way attack.

Mathematically, the two interactions are modeled by independent Bernoulli random variables X₁ and X₂, where X_i = 0 denotes a correct transmission (no error) in the i‑th direction and X_i = 1 denotes an error. The probability that Eve correctly guesses the raw key bit after combining the two measurements is

P_success = P(X₁=0, X₂=0) + ½


Comments & Academic Discussion

Loading comments...

Leave a Comment