Coherent eavesdropping strategies for the four state quantum cryptography protocol.

From MaRDI portal

DOI10.1016/S0375-9601(97)00176-XzbMATH Open1042.81520arXivquant-ph/9702002OpenAlexW1993562880WikidataQ59458916 ScholiaQ59458916MaRDI QIDQ1968248FDOQ1968248


Authors: Yanyan Li Edit this on Wikidata


Publication date: 7 March 2000

Published in: Physics Letters. A (Search for Journal in Brave)

Abstract: An elementary derivation of best eavesdropping strategies for the 4 state BB84 quantum cryptography protocol is presented, for both incoherent and two--qubit coherent attacks. While coherent attacks do not help Eve to obtain more information, they are more powerful to reveal the whole message sent by Alice. Our results are based on symmetric eavesdropping strategies, which we show to be sufficient to analyze these kind of problems.


Full work available at URL: https://arxiv.org/abs/quant-ph/9702002




Recommendations



Cites Work


Cited In (13)





This page was built for publication: Coherent eavesdropping strategies for the four state quantum cryptography protocol.

Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1968248)