Eavesdropping on practical quantum cryptography
From MaRDI portal
Publication:4817801
DOI10.1080/0950034031000077542zbMATH Open1106.81331arXivquant-ph/0211155OpenAlexW4229843012MaRDI QIDQ4817801FDOQ4817801
Authors: Mark S. Williamson, Vlatko Vedral
Publication date: 21 September 2004
Abstract: Practical implementations of quantum cryptography use attenuated laser pulses as the signal source rather than single photons. The channels used to transmit are also lossy. Here we give a simple derivation of two beam-splitting attacks on quantum cryptographic systems using laser pulses, either coherent or mixed states with any mean photon number. We also give a simple derivation of a photon-number splitting attack, the most advanced, both in terms of performance and technology required. We find bounds on the maximum disturbance for a given mean photon number and observed channel transmission efficiency for which a secret key can be distilled. We start by reviewing two incoherent attacks that can be used on single photon quantum cryptographic systems. These results are then adapted to systems that use laser pulses and lossy channels.
Full work available at URL: https://arxiv.org/abs/quant-ph/0211155
Recommendations
- Practical quantum cryptography: secrecy capacity and privacy amplification
- Security aspects of practical quantum cryptography
- Large pulse attack as a method of conventional optical eavesdropping in quantum cryptography
- Practical aspects of quantum cryptographic key distribution.
- Faint laser quantum key distribution: eavesdropping exploiting multiphoton pulses
Cited In (9)
- Secrecy, computational loads and rates in practical quantum cryptography
- Title not available (Why is that?)
- Key distribution. I: Quantum menace
- Effects of antisqueezing for ASK-type Y00 cryptosystem
- Large pulse attack as a method of conventional optical eavesdropping in quantum cryptography
- On the optimal mean photon number for quantum cryptography
- Title not available (Why is that?)
- Practical quantum cryptography: secrecy capacity and privacy amplification
- Faint laser quantum key distribution: eavesdropping exploiting multiphoton pulses
This page was built for publication: Eavesdropping on practical quantum cryptography
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4817801)