Eavesdropper's optimal information in variations of Bennett-Brassard 1984 quantum key distribution in the coherent attacks
From MaRDI portal
Publication:1594638
DOI10.1016/S0375-9601(00)00825-2zbMath0972.94026arXivquant-ph/0009006MaRDI QIDQ1594638
Won Young Hwang, Doyeol (David) Ahn, Sung Woo Hwang
Publication date: 6 February 2001
Published in: Physics Letters. A (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/quant-ph/0009006
Related Items
Cites Work
- Quantum cryptography without public announcement of bases
- Quantum cloning, eavesdropping and Bell's inequality
- Coherent eavesdropping strategies for the four state quantum cryptography protocol.
- A proof of the security of quantum key distribution (extended abstract)
- Quantum cryptography based on Bell’s theorem
- Quantum cryptography without Bell’s theorem
- Error Correcting Codes in Quantum Theory
- A single quantum cannot be cloned
- Mixed-state entanglement and quantum error correction