Eavesdropper's optimal information in variations of Bennett-Brassard 1984 quantum key distribution in the coherent attacks
From MaRDI portal
Publication:1594638
DOI10.1016/S0375-9601(00)00825-2zbMATH Open0972.94026arXivquant-ph/0009006OpenAlexW3102839153MaRDI QIDQ1594638FDOQ1594638
Authors: Won Young Hwang, Doyeol (David) Ahn, Sung Woo Hwang
Publication date: 6 February 2001
Published in: Physics Letters. A (Search for Journal in Brave)
Abstract: We calculate eavesdropper's optimal information on raw bits in Bennett-Brassard 1984 quantum key distribution (BB84 QKD) and six-state scheme in coherent attacks, using a formula by Lo and Chau [Science 283 (1999) 2050] with single photon assumption. We find that eavesdropper's optimal information in QKD without public announcement of bases [Phys. Lett. A 244 (1998) 489] is the same as that of a corresponding QKD WITH it in the coherent attack. We observe a sum-rule concerning each party's information.
Full work available at URL: https://arxiv.org/abs/quant-ph/0009006
Recommendations
- OPTIMAL EAVESDROPPING ON NOISY STATES IN QUANTUM KEY DISTRIBUTION
- On conclusive eavesdropping and measures of mutual information in quantum key distribution
- Another Look at Symmetric Incoherent Optimal Eavesdropping against BB84
- Tightening the eavesdropping accessible information for continuous variable quantum key distribution protocols that involve nonmaximally entanglement
- Optimization of coherent attacks in generalizations of the BB84 quantum bit commitment protocol
- On eavesdropping strategy for symmetric coherent states quantum cryptography using heterodyne measurement
- Generalized discrimination between symmetric coherent states for eavesdropping in quantum cryptography
- Optimal eavesdropping on quantum key distribution without quantum memory
Cites Work
- Quantum cryptography based on Bell’s theorem
- Error Correcting Codes in Quantum Theory
- A single quantum cannot be cloned
- Quantum cryptography without public announcement of bases
- Coherent eavesdropping strategies for the four state quantum cryptography protocol.
- Quantum cryptography without Bell’s theorem
- Mixed-state entanglement and quantum error correction
- A proof of the security of quantum key distribution (extended abstract)
- Quantum cloning, eavesdropping and Bell's inequality
Cited In (13)
- A modified quantum key distribution without public announcement bases against photon-number-splitting attack
- A practical protocol for three-party authenticated quantum key distribution
- An entropic analysis of approximate quantum error correction
- On conclusive eavesdropping and measures of mutual information in quantum key distribution
- Another Look at Symmetric Incoherent Optimal Eavesdropping against BB84
- Coherent eavesdropping strategies for the four state quantum cryptography protocol.
- OPTIMAL EAVESDROPPING ON NOISY STATES IN QUANTUM KEY DISTRIBUTION
- Efficiency of the eavesdropping in B92 QKD protocol with a QCM
- Quantum key distribution with several intercepts and resend attacks
- An improved QKD protocol without public announcement basis using periodically derived basis
- SYMMETRIC COLLECTIVE ATTACKS FOR THE EAVESDROPPING OF SYMMETRIC QUANTUM KEY DISTRIBUTION
- RAW-DATA ATTACKS IN QUANTUM CRYPTOGRAPHY WITH PARTIAL TOMOGRAPHY
- Quantum key evolution and its applications
This page was built for publication: Eavesdropper's optimal information in variations of Bennett-Brassard 1984 quantum key distribution in the coherent attacks
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1594638)