Coherent eavesdropping strategies for the four state quantum cryptography protocol.
From MaRDI portal
DOI10.1016/S0375-9601(97)00176-XzbMATH Open1042.81520arXivquant-ph/9702002OpenAlexW1993562880WikidataQ59458916 ScholiaQ59458916MaRDI QIDQ1968248FDOQ1968248
Authors: Yanyan Li
Publication date: 7 March 2000
Published in: Physics Letters. A (Search for Journal in Brave)
Abstract: An elementary derivation of best eavesdropping strategies for the 4 state BB84 quantum cryptography protocol is presented, for both incoherent and two--qubit coherent attacks. While coherent attacks do not help Eve to obtain more information, they are more powerful to reveal the whole message sent by Alice. Our results are based on symmetric eavesdropping strategies, which we show to be sufficient to analyze these kind of problems.
Full work available at URL: https://arxiv.org/abs/quant-ph/9702002
Recommendations
- Eavesdropper's optimal information in variations of Bennett-Brassard 1984 quantum key distribution in the coherent attacks
- SYMMETRIC COLLECTIVE ATTACKS FOR THE EAVESDROPPING OF SYMMETRIC QUANTUM KEY DISTRIBUTION
- Another Look at Symmetric Incoherent Optimal Eavesdropping against BB84
- Security of EPR-based quantum cryptography against incoherent symmetric attacks
- Generalized discrimination between symmetric coherent states for eavesdropping in quantum cryptography
Cites Work
Cited In (13)
- Multi-partite entanglement can speed up quantum key distribution in networks
- Eavesdropping in semiquantum key distribution protocol
- Four-state quantum key distribution exploiting maximum mutual information measurement strategy
- The effect of classical driving field on the spectrum of a qubit and entanglement swapping inside dissipative cavities
- Quantum cryptography without public announcement of bases
- Intercept/resend and translucent attacks on the quantum key distribution protocol based on the pre- and post-selection effect
- Title not available (Why is that?)
- Eavesdropper's optimal information in variations of Bennett-Brassard 1984 quantum key distribution in the coherent attacks
- Zero-error attacks and detection statistics in the coherent one-way protocol for quantum cryptography
- Mutually unbiased bases in 3 and 4 dimensions semi-quantum key distribution protocol
- Effect of time dependent coupling on the dynamical properties of the nonlocal correlation between two three-level atoms
- Entanglement in the bimodal Jaynes-Cummings model with the two-mode squeezed vacuum state
- Geometrical analysis of physically allowed quantum cloning transformations for quantum cryptography
This page was built for publication: Coherent eavesdropping strategies for the four state quantum cryptography protocol.
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1968248)