Analysis of quantum key distribution based on unified model of sequential state discrimination strategy

The quantum key distribution for multiparty is one of the essential subjects of study. Especially, without using entangled states, performing the quantum key distribution for multiparty is a critical area of research. For this purpose, sequential state discrimination, which provides multiparty quantum communication and quantum key distribution for multiple receivers, has recently been introduced. Moreover, the sequential state discrimination is applicable for the security analysis against an eavesdropper’s attack. In this work, we provide the security analysis of quantum key distribution by proposing a unified model of sequential state discrimination including an eavesdropper. In this model, the success probability of eavesdropping is used as a figure of merit for the security analysis. Moreover, we obtain a non-zero secret key rate between the sender and receiver, which implies that the sender and receiver can share a secret key despite the eavesdropper’s scheme that optimizing the success probability of eavesdropping. Further, we propose an experimental methodology for the proposed model, which is implementable with linear optics. We observe that the secret key between the sender and receiver can be non-zero, even with imperfections.

In this paper, we focus on the second case, in which an intruder tries to eavesdrop on the result of a receiver.We provide a systematic security analysis from a unified model of sequential state discrimination including an eavesdropper.In this proposed model, the success probability of eavesdropping and the secret key rate 54 can be considered as a figure of merit for the security analysis.Specifically, the figure of merit for Eve is the success probability of eavesdropping, but the figure of merit for Alice and Bob is the secret key rate.Our study shows that although Eve performs an optimal measurement for the success probability of eavesdropping, the secret key rate between Alice and Bob is not zero.
In addition, we propose an experimental scheme that implements a new sequential state discrimination method composed of Alice-Eve-Bob.This scheme consists of a linear optical system similar to a Sagnac interferometer 42,55 .The experimental setup can realize optimal success probability of eavesdropping for Eve, as well as non-zero secret key rate between Alice and Bob against the Eve.In other words, the protection of quantum communication between two receiters against an eavesdropper's optimal scheme is possible with experimentally feasible setup.Further, we provide the success probability of eavesdropping and the secret key rate, considering the imperfections that can occur in the source, channel, and detector.White noise and colored noise are considered imperfections of the source 56 .The dark count rate and detection efficiency are considered imperfections of the detector 57 .We further propose that, despite these imperfections, the non-zero secret key rate between Alice and Bob is possible.

Eavesdropper's strategies
For an intruder, there are two ways of eavesdropping.The first is to eavesdrop on the quantum state of sender Alice and the other is to eavesdrop on the result of receiver Bob.When the intruder Eve, eavesdrops on the quantum state of sender Alice, she can do it using unambiguous discrimination, without an error.However, from the argument of sequential state discrimination, this process can be observed by Alice and Bob 40 .Therefore, the sender and receiver can recognize the presence of an eavesdropper.
When Eve wants to eavesdrop on the result of receiver Bob, she should be in a quantum entangled state with Bob.Assuming that the existence of an eavesdropper is unnoticed, the eavesdropping can be described as a noisy quantum channel to of Alice and Bob as Fig. 1a.When Alice prepares |ψ a � ( a ∈ {0, 1}) with prior probability q a , the noisy quantum channel between Alice and Bob can be described as follows: Here, the lower indices A and B denote the systems of Alice and Bob.I B = |1��1| + |2��2| is an identity operator defined in the system of Bob, which consists of an orthonormal basis {|1�, |2�} .In Eq. (2), η AB ∈ [0, 1] denotes the channel efficiency between Alice and Bob.

Type-I structure of eavesdropper's scheme
Let us consider the eavesdropper's scheme illustrated as Fig. 1b.If quantum systems of Bob and Eve are considered, Eve uses a quantum machine to deterministically transform the Alice's state |ψ a � to a composite state between Bob and Eve: (1) Figure 1.Type-I structure of Eve's scheme for eavesdropping Bob's measurement result.In this scheme, Eve uses a quantum machine that deterministically transforms Alice's state |ψ a � to a composite system |Ŵ a � written in Eq. ( 3) such that Tr E (|Ŵ a ��Ŵ a |) = � (A→B) (|ψ a ��ψ a |) .Then, she measures her subsystem to obtain information about Bob's measurement result.If Eve is unnoticed by Alice and Bob, then the quantum channel between Alice and Bob is described as a depolarizing channel � (A→B) in Eq. ( 2) www.nature.com/scientificreports/with an entangled state where is the entangled state between Bob and Eve.Then, Eve performs a quantum measurement on her system to discriminate Bob's measurement result.If η AB is equal to one, then the composite state in Eq. ( 3) is a product state.Thus, Eve cannot obtain information by measuring her subsystem.Otherwise, Eve can obtain the information about Bob's measurement result.We note that the partial state of Bob is equal to Eq. ( 2).

Type-II structure of eavesdropper's scheme
The drawback of the eavesdropping scheme introduced above is that it requires a quantum machine deterministically producing |Ŵ a � .Since designing the quantum machine can be difficult, we further propose an alterna- tive eavesdropping scheme.In this scheme, we can consider a composite state between Bob and Eve as follows: which satisfies Tr E σ a,BE = � (A→B) (|ψ a ��ψ a |) .The procedure for producing the composite state in Eq. ( 5) is illustrated in Fig.These two types can provide same security.That is because the joint measurement probability between Bob and Eve in the type-I structure is equal to that in the type-II structure.Particularly, the type-II structure can be easily reproduced in an experimental setup.

Sequential state discrimination including eavesdropper
For the security analysis, we propose the new sequential state discrimination for describing the two eavesdropper's schemes.We first explain the structure of sequential state discrimination, and propose the optimal success probability of eavesdropping.We further investigate the amount of the secret key rate in frame of the sequential state discrimination scenario.

Structure of sequential state discrimination
Let us first explain how each of the eavesdropping scheme introduced in the previous section is described as a sequential state discrimination problem.It is noted that the unambiguous discrimination can be applied to the B92 protocol 3,58 .For this reason, we consider that Bob has a quantum measurement which can unambiguously discriminates Alice's states |ψ 0 � and |ψ 1 �.
We first consider the type-I structure.We note in advance that our argument in here can also be applied to the type-II structure.Suppose that positive-operator valued measure (POVM) {M b ( b ∈ {0, 1, ?} ) is given by 34,39,40 : (3) 1 ��α 1 |.For a = b , the inner product between |α b � and |ψ a � is equal to zero.It guides us to the fact that the measurement described in terms of the Kraus operators in Eq. ( 6) can perform the unambiguous discrimination.When Bob obtains a conclusive result b ∈ {0, 1} , the Kraus operator K where |γ ab � are written as Here, N is the normalization constant and is a pure state spanned by {|1�, |2�} .According to Eq. ( 10), | ψ b � is orthogonal to |0� .Moreover, the label of | ψ b � in Eq. ( 8) is equal to the measurement result of Bob.Therefore, Eve can eavesdrop the measurement result of Bob by discriminating | ψ 0 � and | ψ 1 � with her measurement described as the POVM {M e is the POVM element corresponding to the measurement result e.In Eq. (11), I E is the identity opera- tor on Eve's system, u e is the non-negative real number, and |u e � is the vector in the subspace {|1�, |2�} satisfying � ψ b |u e � = δ be .We note that |u e � can be constructed in the same way as Eq. ( 7) 40 .
In the aspect of the quantum state discrimination task, the finite (but nonzero) success probability implies that a receiver can obtain an information about sender's state 3 .Thus, one of the probable figures of merit is "the success probability of eavesdropping" in case of type-I structure, which is described as (the detailed evaluation is presented in Methods) Assume that Bob performs optimal unambiguous discrimination on Alice's state.Then, P (E) s,opt , which is the optimum success probability of eavesdropping, can have a simple expression such as P Vol.:(0123456789)The detailed evaluation of the optimization is presented in Methods.If s ∈ [0, q 1 /q 2 ] , we get α 0 = 1 − q 1 q 0 s and α 1 = 1 − q 0 q 1 s from Bob's optimal POVM condition 18 .Figure 3a illustrates the optimum success probability of eavesdropping(P (E) s,opt ) in Eq. ( 13).Here, we have used q 0 = 0.4(q 1 = 0.6) and η AB = 0.5 .In Fig. 3a, the solid black line(dashed black line) indicates

Scientific
According to Fig. 3a, in the region of s < 0.6538 , P (E) s,opt1 (solid black line) is optimum.That is because, as illustrated in Fig. 3b, both f 0 (s) and f 1 (s) in Eq. ( 14) are non-negative in this region.Meanwhile, P (E) s,opt2 (dashed black line) is optimum in the region of s > 0.6538 , since one of f 1 (s) is negative.Thus, the optimum success probability of eavesdropping is indicated by the solid red line.
We further evaluate the success probability of eavesdropping in type-II structure as where τ ab,E are defined as From the straightforward calculation, the success probability of eavesdropping in Eq. ( 15) is equal to Eq. ( 12).The proof is presented in Methods.Thus, the optimal success probability of eavesdropping in type-II structure is also analytically derived as Eq. ( 13).

Secret key rate
In sequential state discrimination scenario among Alice, Bob, and Eve, Alice and Bob can obtain secret key as follows.Let us suppose that Eve performs the eavesdropping scheme discussed in the previous section with optimal success probability of the eavesdropping.Then, due to Eve's measurement which extracts information of Bob's measurement outcome, an event that Alice's prepared bit and Bob's outcome are not equal happens with nonzero probability.By this discrepancy between Alice and Bob, they notice the presence of Eve.This means that Alice and Bob can share the secret key even though Eve performs most efficient eavesdropping scheme.Note that Bob performs optimal unambiguous discrimination on Alice's states, he is not supposed to get error outcomes if Eve does not exist between Alice and Bob.
According to Csiszar and Korner 54 , when the amount of information between a receiver and a sender is larger than that between a receiver and eavesdropper, a secret key can exist as an amount equal to the difference of information.The secret key rate is defined as ( 15) s,opt2 in Eq. ( 13), respectively, and solid red line is the optimal success probability of eavesdropping.In (b), f 0 (s) and f 1 (s) in Eq. ( 14) are depicted, where these functions are used for deciding which value between P (E) s,opt1 and P (E) s,opt2 is indeed optimal, on the basis of the condition written in Eq. ( 13).
Vol:.( 1234567890 54 .As illustrated in Fig. 4, Bob and Eve can perform the following post-processing.In case that Bob performs optimal unambiguous discrimination, he can discard the measurement result when he obtains an inconclusive result.This post-processing can enhance the amount of information shared between Alice and Bob 59 .In this way, the joint probability between Alice and Bob is which constitutes the Shannon mutual information in Eq. ( 17).Here.a, b ∈ {0, 1, ?} are the measurement results for Alice and Bob, respectively.Similarly, when Eve obtains an inconclusive result, she discards the measurement result.Thus, it seems that Eve can successfully obtain information about Bob.However, Bob and Eve are separated in space and the information leakage discussed above is not permitted.In other words, Eve cannot discard her measurement result based on whether Bob obtained an inconclusive result or not.Therefore, the joint probability between Bob and Eve should be changed as follows: where b, e ∈ {0, 1, ?} are the measurement results for Bob and Eve, respectively.
Figure 5 shows the secret key rate K AB:E written in Eq. ( 17), considering the marginal probability between Bob and Eve which is updated from Eq. ( 19).Here, P AB (a, b) and P BE (b, e) in Eqs. ( 18) and ( 19) are evaluated by considering Bob's POVM optimizing optimal unambiguous discrimination and Eve's POVM maximizing success probability of eavesdropping (For the details, see "Secret key rate" in Methods).We note that the both two types of eavesdropper's scheme provides same secret key rate (for detail, see Methods).Here, the channel efficiency is considered as η AB = 0.9(solid red line), η AB = 0.8(solid blue line), η AB = 0.7(solid black line), and η AB = 0.6(solid purple line).As shown in Fig. 5, as the overlap s increases, K AB:E also increases.However, from a specific overlap K AB:E decreases.For example, for η AB = 0.9 , in the region of s < 0.4585 , K AB:E increases but in the region of s > 0.4585 , K AB:E decreases.
The secret key rate K AB:E exhibits interesting behavior.When the overlap s is large, it is difficult for Bob and Eve to efficiently implement the quantum state discrimination.In this case, the mutual information between Alice and Bob, and Bob and Eve becomes small.However, when s is small, Bob and Eve can easily and efficiently implement the quantum state discrimination.In this case, the mutual information between Alice and Bob, and Bob and Eve becomes large.

Method for experimental implementation
Let us propose an experimental method for a unified model of sequential state discrimination including an eavesdropper with quantum optics.Even though the type-I structure was used previously, we will use type-II structure, because it can be easily implemented in an experimental setup.In the type-II structure, Alice prepares a quantum state In other words, Eve does not have ability to discard her messages by presuming Bob's inconclusive results.This supports the reason that the joint probability needs to be considered as Eq. ( 19).
where |h� and |v� represent horizontal and vertical directions, respectively.Eve, who controls channel efficiency η AB , can eavesdrop as follows: (i) With a probability of η AB , Eve does not eavesdrop on the quantum state of Alice.
(ii) With a probability of 1 − η AB , Eve eliminates the quantum state of Alice and shares a maximally entangled state with Bob.(iii) After Bob's measurement, Eve performs measurement on her subsystem.In Fig. 6 of the next page, we illustrate the experimental setup(for details about the description, see Supplementary information).Here, the experimental setup of Bob and Eve is based on a Sagnac-like interferometer 55 .The setup consists of a half-wave plate(HWP), polarized beam splitter(PBS), and single-photon detector(SPD).In step (ii), Eve generates a maximally entangled two-photon polarization state |φ + � = 1 √ 2 (|hh� + |vv�) , using a type-II spontaneous parametric down conversion(SPDC) 60 .Type-II SPDC includes beta-barium borate(BBO) crystals, two birefringent crystals, HWP, and quarter-wave plate(QWP).HWP and QWP transform the entangled pure state, generated by the BBO and birefringent crystals, into one of the four Bell-states.Note that the maximally entangled two-photon polarization state is also efficiently generated by the Sagnac interferometer in which a periodically-poled KTP crystal is equipped.
According to the type-II structure, if Eve generates |φ + � with a probability of 1 − η AB , Eve can eavesdrop on the result of Bob, based on the selection of the path of a single photon and the measurement result of two SPDs.Ideally, Bob performs an unambiguous discrimination based on a Sagnac-like interferometer, and Eve can eavesdrop with the optimum success probability of eavesdropping by constructing a Sagnac-like interferometer.It should be emphasized that despite the attack by Eve, Alice and Bob can obtain the secret key rate.
In reality, one should consider imperfections occurring in the photon state and in SPD.We consider the dark count rate(ν > 0 ) and detection efficiency(0 < η < 1 ) for the SPD.The photon state in the setup consists of two types: a single-photon polarization state that Alice sends to Bob, and the single photon state of maximally entangled state generated by Eve.Different types of photon states suffer from different types of noises.For example, the single-photon polarization state may disappear under a noisy channel, which is called "amplitude damping" 61,62 .We assume that amplitude damping can occur between Alice and Bob and between Bob and Eve.In addition, white or colored noise can occur when Eve generates a maximally entangled quantum state 56 .Particularly, colored noise which occurs because of imperfections in experimental entangling operations is more frequent than white noise 56 .By including all the imperfections discussed above, Bob and Eve eventually shares the following quantum state: for given Alice's bit a ∈ {0, 1} .Here, η AB is the channel efficiency between Alice and Bob, � (ad) D 0 is an amplitude damping channel between Alice and Bob with damping ratio D 0 , and � (ad) D is the amplitude damping channel between Eve and Bob with the damping ratio D e .̺ ent is a noisy entangled state generated by Eve.If Eve's entangled state is exposed to white noise, then the noisy entangled state is written as 56 and if it is exposed to color noise, then 56 (20) The success probability of eavesdropping under imperfections described as Eqs.( 21)-( 23) is displayed in Fig. 7a (for detail, see Supplementary information).In Fig. 7a, the value of η AB = 0.5 , η ent = 0.5 , and η = 0.8 are considered, where the detection efficiency η = 0.8 is the value of a commercialized superconducting nanowire single-photon detector(SNSPD) whose dark count rate is nearly zero 63 .In Fig. 7a, the solid line, dashed line, and dash-dot line correspond to the cases of decoherence parameter, D = 0.1 , D = 0.2 , and D = 0.3 , respectively(a large D implies that the decoherence rate is high).Here, we assume that D 0 = D e = D for considering the rela- tion between the secret key rate and a single decoherence parameter.The black and blue lines show the cases of white and colored noise, respectively.
In Fig. 7b, the secret key rate between Alice and Bob with the imperfections in Eqs. ( 21)-( 23) is displayed, considering various imperfections (for detail, see Supplementary information).Here, η AB = 0.5 , η ent = 0.5 , and η = 0.8 are considered.The blue(black) line corresponds to colored(white) noise.The solid(dashed) line corresponds to D 0 = 0.1(D 0 = 0.2 ).In every case, D e is taken as 0.4.It should be noted that the secret key rate does not change when D 0 = D e owing to the post-processing expressed in Eq. (19).As shown in Fig. 7b, the graph of the secret key rate has one global maximum.This implies that (i) if s tends to be smaller, then the secret key rate decreases because the tendency of s makes Eve as well as Bob to easily discriminate the quantum states, and (ii) if s tends to be larger, then the secret key rate decreases because the tendency of s makes discrimination performed by Bob and Eve difficult.

Conclusion
In this paper, we have proposed a unified model of sequential state discrimination including an eavesdropper.We have shown that even though Eve uses an entanglement to eavesdrop on Bob's measurement result, Alice and Bob can have a non-zero secret key rate.Furthermore, we have proposed an experimental model for eavesdropping.www.nature.com/scientificreports/Because our experimental method consists of linear optical technologies, the implementation of our method is practical.Ideally, our experiment can achieve optimum success probability of eavesdropping.Beyond the ideal case, we have investigated possible imperfections including quantum channels between Alice and Bob, entanglement between Bob and Eve, and the inefficiency of Bob's SPD.It is interesting that the non-zero secret key rate is possible even under such the imperfections.In this paper, we have focused on security analysis of the B92 protocol in view of the sequential state discrimination scheme.That is because the security analysis can be performed with the simple mathematical structure of the unambiguous discrimination 22,40 .We emphasize that our methodology based on the sequential state discrimination can be applied to the various kinds of quantum communication 64 as well as quantum key distribution 45,65 designed in prepare-and-measure way.Moreover, our scheme can be applied to quantum communication or key distribution task utilizing the continuous variable quantum systems 57,66 .We further emphasize that our research propose a novel theoretical way to unify the secure quantum communication tasks in terms of the quantum state discrimination.
It also should be noted that our sequential state discrimination model can be extended to the case of unambiguously discriminating N pure states 1,22 .This extension is important since large N guarantees large amount of transmitted bits per a signal pulse.Moreover, our experimental idea can also be applied to the continuous variable version.That is because sequential measurement that unambiguously discriminates two coherent states can be designed with linear optics 41 .

Success probability of eavesdropping
In this section, we derive and optimize the success probability of eavesdropping by considering both types of eavesdropping strategies.

Describing type-I structure of eavesdropper
In this structure, the following entangled state between Bob and Eve is considered:  26) and ( 27) into Eq. ( 25) we obtain We define (normalized) pure states by Substituting Eq. ( 29) into Eq.( 28), we obtain the representation of Eq. ( 6) in the letter with |γ ab � defined by Consider Eve's POVM as {M ? } where each POVM element is given by where u 0 and u 1 are non-negative real numbers, and |u 0 � and |u 1 � are vectors orthogonal to |0� E and satisfying �u b | ψ a � = δ ab for every a, b ∈ {0, 1}.From Eqs. ( 28)-( 31), the success probability of eavesdropping is obtained by Optimization According to Eq. ( 29), inner product � ψ 0 | ψ 1 � is obtained by ( 25) 1 are also orthogonal to |0� E .This implies that Eve's POVM is designed to discriminate | ψ 0 � and | ψ 1 � .Therefore, the constraint of Eve's POVM is given by 39 Therefore, we obtain the following optimization problem: For fixed parameters α 0 and α 1 , an optimal point (u 0 , u 1 ) satisfies Also, for the optimal point, there exists a non-zero real number satisfying where We note that Eq. ( 37) is equivalent to 39 Combining Eqs. ( 36) and (38), we obtain the optimal point by Since the optimal point (u 0 , u 1 ) is on the surface of Eq. ( 34), both u 0 and u 1 in Eq. ( 39) should be non-negative.For this reason, the overlap s also should be Considering s in the region of Eq. ( 40), the optimal success probability of eavesdropping is analytically given by Suppose that Bob performs optimal unambiguous discrimination between two pure states |ψ 0 � and |ψ 1 � .Then, α 0 and α 1 are given by 18 if Substituting Eq. ( 42) with α 0 and α 1 in Eq. ( 40), we obtain We note that if one of inequalities in Eq. ( 44) does not hold, then the optimal point (u 0 , u 1 ) is given by Substituting this optimal point into Eq.( 32), we obtain the optimal success probability of eavesdropping: (41) (44) f 0 (s) := q 1 s 3 − √ q 0 q 1 s 2 − q 0 s + √ q 0 q 1 > 0, f 1 (s) := q 0 s 3 − √ q 0 q 1 s 2 − q 1 s + √ q 0 q 1 > 0.
We derive the success probability of eavesdropping as where τ ab,E are defined as From Eqs. ( 48) and ( 50), the success probability of eavesdropping in Eq. ( 49) is obtained by Eq. ( 32).

Secret key rate
In this section, we derive the secret key rate when Eve's POVM optimizes the success probability of eavesdropping.

Secret key rate of type-I eavesdropping structure
To derive the secret key rate, we need to evaluate entropies H(A), H(B, A), H(E) and H(B, E).For equal prior probabilities (i.e., q 0 = q 1 ), H(A) is given by Also, H(B, A) is given by where P AB (a, b) is a post-processed joint probability between Alice and Bob after Bob discards his inconclusive result: and P AB (a, b) is a pre-processed joint probability Here, we consider the post-processing that Bob discard his inconclusive result, since this post-processing can enhance unambiguous quantum communication protocol 59 .Since q 0 = q 1 implies u 0 = u 1 = 1 − s according to Eqs. ( 39) and ( 42), the joint probability of Eq. ( 54) is rewritten by ) H(A) = −q 0 log 2 q 0 − q 1 log 2 q 1 = 1.where P B|A (b|a) and P E|AB (e|a, b) are conditional probabilities.
1.In case of b =? , every |γ ab � in Eq. ( 30) is rewritten by where Therefore, P E|AB (e|a, b) is given by Substituting Eq. ( 60) into P E|AB (e|a, b) of Eq. ( 57), we obtain and 2. in case of b =? , we provide following equality: In the same way as Eq. ( 30), we obtain (Since P B|A (?|a) is too complicated, we do not describe it in detail.)Therefore, P E|AB (e|a, ?) is given by Substituting Eq. () into P E|AB (e|a, b) of Eq. ( 57), we obtain and Since q 0 = q 1 implies u 0 = u 1 = 1 − s according to Eqs. ( 39) and ( 42), the joint probability P BE (b, e) of Eqs. (62)nd (67) are rewritten by Revisiting success probability of eavesdropping in terms of joint probabilities In the scenario of the new sequential discrimination, Bob's measurement result b depends on the input a prepared by Alice, and Eve's measurement result e depends on a and b.From these facts, the joint probability between three parties P ABE (a, b, e) is easily derived by where q a is the prior probability that Alice prepares a, P B|A (b|a) is the conditional probability that Bob obtains b if Alice prepares a, P E|AB(e|a,b is the conditional probability that Eve obtains e if Alice prepares a and Bob obtains b, P BE|A (b, e|a is the conditional joint probability that Bob and Eve obtain b and e if Alice prepares a, and P BE (b, e) is the joint probability that Bob and Eve obtain b and e.Also, the success probability of eavesdropping is derived by It is noted that the expression of the success probability of eavesdropping in Eq. ( 78) is used for deriving the success probability of eavesdropping when Alice, Bob, and Eve performs the scenario by using the imperfect linear optical technologies.
(77) P ABE (a, b, e) = q a P B|A (b|a)P E|AB (e|a, b) = q a P BE|A (b, e|a),

?
} denotes the measurements of Bob.Then, the Kraus operator K (B) b corresponding to the POVM element M (B)

Figure 3 .
Figure 3. (a) Success probability of eavesdropping with respect to overlap s = |�ψ 0 |ψ 1 �| between two Alice's states.Solid black line and dashed black line are success probabilities of eavesdropping P (E) s,opt1 and P (E)

( 17 ),Figure 4 .
Figure 4. Post-processing performed by Bob and Eve.Let us suppose that Bob has 10 measurement results b 1 , • • • , b 10 , and Eve has measurement results e 1 , • • • , e 10 .Bob can discard the inconclusive results b 4 , b 5 , b 10 , and Eve can also discard e 2 and e 8 .We note that there may no classical communication between Bob and Eve.In other words, Eve does not have ability to discard her messages by presuming Bob's inconclusive results.This supports the reason that the joint probability needs to be considered as Eq.(19).
2. In this figure, Eve lets Alice's state be transmitted to Bob with a probability η AB , or discard Alice's state and share |φ + � with Bob with a probability 1 − η AB .Let us suppose that |φ + ��φ + | is replaced to |22��22| in Eq. (5), which means that Bob and Eve eventually shares a fully separable state.In this case, each Kraus operator of Bob transforms 1 2 |11��11| + 1 2 |22��22| to another rank-2 state.It leads us to that Eve fails to design a quantum measurement used in type-I and -II eavesdropping schemes.Thus, Eve needs entanglement between herself and Bob in order to obtain meaningful information about his outcome.