The mutual information between Alice and Eve is a fundamental concept in the field of quantum cryptography, specifically in the context of the security of quantum key distribution (QKD) protocols. It quantifies the amount of information that Eve, an eavesdropper, can potentially gain about the secret key shared between Alice and Bob, the legitimate parties. In this answer, we will explore how the mutual information between Alice and Eve changes as the disturbance introduced by Eve increases.
In QKD protocols, Alice and Bob exchange quantum states, such as single photons, to establish a secret key. These quantum states are encoded with information that Eve may try to intercept and measure, in an attempt to gain knowledge about the key without being detected. The disturbance introduced by Eve refers to the perturbations she introduces during her eavesdropping attempts.
To analyze the impact of disturbance on the mutual information, we need to consider the two main types of QKD protocols: prepare-and-measure (or one-way) protocols and entanglement-based protocols.
In prepare-and-measure protocols, Alice prepares quantum states and sends them to Bob, who measures the received states in a randomly chosen basis. The disturbance introduced by Eve can be modeled as an additional measurement performed by Eve on the intercepted states. As Eve's disturbance increases, she gains more information about the key, thereby increasing the mutual information between her and Alice.
The mutual information can be quantified using the Holevo bound, which provides an upper bound on the amount of information that Eve can extract from the intercepted states. As Eve's disturbance increases, she can perform more precise measurements, leading to a higher mutual information.
In entanglement-based protocols, Alice and Bob share entangled quantum states, and the key is extracted through measurements performed on their respective parts of the entangled states. Here, the disturbance introduced by Eve can be seen as her attempt to gain information by performing measurements on her part of the entangled states. As Eve's disturbance increases, she can extract more information from her part of the entangled states, which in turn increases the mutual information between her and Alice.
It is important to note that QKD protocols are designed to detect the presence of an eavesdropper. By monitoring the error rates in the exchanged quantum states, Alice and Bob can detect the presence of Eve and abort the key generation process if necessary. Therefore, even if the mutual information between Alice and Eve increases with the disturbance, the security of the key can still be maintained by detecting Eve's presence and taking appropriate actions.
As the disturbance introduced by Eve increases in QKD protocols, the mutual information between Alice and Eve also increases. This is due to Eve gaining more information about the secret key through her eavesdropping attempts. However, the security of the key can still be maintained by detecting Eve's presence through monitoring the error rates in the exchanged quantum states.
Other recent questions and answers regarding Eavesdropping strategies:
- How do decoy states contribute to enhancing the security of quantum key distribution against eavesdropping?
- What is a coherent attack in the context of eavesdropping in quantum key distribution?
- What is the advantage of the 6-state protocol in terms of withstanding individual attacks?
- What is the purpose of analyzing the mutual information between Alice and Eve in quantum key distribution?
- How does the mutual information between Alice and Bob and Alice and Eve vary for different quantum key distribution protocols?
- How do individual attacks differ from coherent attacks in terms of the states they target and the measurements performed?
- What are the three main types of eavesdropping strategies in quantum key distribution?
- How does the scalar product of ancillary states used by an eavesdropper affect the amount of information they can gain?
- What is the main goal of an eavesdropper in the context of quantum key distribution?

