
probability (majority basis). Fewer bits are discarded
by increasing the probability that the bases match,
which results in higher efficiency. Lo et al. also in-
troduced a refined calculation method for the QBER
in line with the basis selection bias. Alice and Bob
calculate the QBER for each basis, not for both bases
together. The calculation method for the QBER pre-
vents an intercept-and-resend (I-R) attack, in which
Eve intercepts quantum states from Alice, measures
them, and resends the same quantum states to Bob
as the measurement results. The interception of all
quantum states that is measured only in the majority
basis is detected by increasing the QBER on the mi-
nority basis. However, the above mentioned method
is applicable to the case of intercepting all quantum
states and the case of intercepting only a portion of
the quantum states is not considered. The greater the
bias in basis selection, the smaller the probability that
both Alice and Bob select the minority basis. Eve is
therefore able to intercept quantum states without be-
ing detected if she attacks only a part of them.
1.2 Contribution
This letter considers a variant of the I-R attack using
only the majority basis, in which Eve intercepts only a
part of the quantum states, particularly the initial part.
We firstly calculate the probability that the attack is
detected, (i.e., the probability of increasing the QBER
on the minority basis). We estimate the number of bits
until the first detection on the basis of the calculated
probability and the properties of the geometric distri-
bution. The estimated value is the number of bits to
intercept. We then calculate the proportion of the suc-
cessful attack among the intercepted bits and estimate
the number of correctly intercepted bits. The attack
succeeds if Eve guesses the correct basis and receives
the same bits as Alice and Bob. We finally evaluate
the impact on the security of the secret key via the
acquired bits corresponding to the value of the bias.
Since the bits, including the bits we did not obtain in
our attack, are randomized in the key distillation pro-
cess, we do not obtain the bit sequence of the secret
key itself. Instead, we discuss the extent to which the
obtained bits affect the security of the secret key, par-
ticularly its entropy.
1.3 Related Works
We review some basic attacks against BB84.
A simple attack is I-R attack (Bennett and Bras-
sard, 1984) mentioned above. Fake-State (F-S) attack
(Makarov and Hjelme, 2005) is a variant of I-R at-
tack, which exploits the weakness of Bob’s detector.
Figure 1: Our Attack Model.
F-S attack utilizes quantum states that are detected by
the Bob in a manner controlled by Eve, instead of the
quantum states that were intercepted and measured.
Photon number splitting (PNS) attack (Huttner
et al., 1995; Brassard et al., 2000; L
¨
utkenhaus, 2000)
uses the existence of the quantum states with multi-
photon such as weak coherent states, not single-
photon. Eve firstly intercepts the quantum states from
Alice, blocks them in the case of single photons, and
in the case of multiple photons, splits off one pho-
ton and sends the rest to Bob. Eve then acquires the
bit information by obtaining the basis information ex-
changed between Alice and Bob and measuring in the
same basis.
2 ATTACK MODEL
We denote the minority basis as X, the majority ba-
sis as Z, the selection probability of the X basis as
P
X
, and the selection probability of the Z basis as
P
Z
. Owing to the bias in basis selection, we set
P
X
= p (0 < p ≤ 1/2) and P
Z
= 1 − p.
An overview of our attack model is shown in Fig-
ure 1. Intuitively, we take advantage of the fact that
the Z basis is chosen more often because of the basis
selection bias. Eve intercepts quantum states from Al-
ice, measures them in the Z basis selected with prob-
ability 1, and resends the same quantum states to Bob
as the measurement results. The quantum states sent
by Alice are the eigenstates of the X basis or Z ba-
sis depending on the probabilities P
X
and P
Z
, whereas
the quantum states received by Bob are the eigen-
states of the Z basis resent by Eve. If our attack fails
(i.e., the QBER calculated by Alice and Bob exceeds
the threshold), the information for the key distillation
process is not exchanged over classical communica-
tion and the protocol is restarted from the beginning.
Eve is therefore able to confirm whether the attack
has been successful or failed. If the attack fails, it is
repeated on the protocol that is restarted.
ICISSP 2025 - 11th International Conference on Information Systems Security and Privacy
572