Revisiting Optimal Eavesdropping in Quantum Cryptography: Choice of Interaction Is Unique up to Rotation of the Underlying Basis
نویسندگان
چکیده
A general framework of optimal eavesdropping on BB84 protocol was provided by Fuchs et al. [Phys. Rev. A, 1997]. An upper bound on mutual information was derived, which could be achieved by a specific type of interaction and the corresponding measurement. However, uniqueness of optimal interaction was posed as an unsolved problem there and it has remained open for almost two decades now. In this paper, we solve this open problem and establish the uniqueness of optimal interaction up to rotation. The specific choice of optimal interaction by Fuchs et al. is shown to be a special case of the form derived in our work.
منابع مشابه
Optimal Eavesdropping in Quantum Cryptography: Choice of Interaction Is Unique up to a Rotation of the Underlying Basis
A general framework of optimal eavesdropping on BB84 protocol was provided by Fuchs et al. in 1997. An upper bound on mutual information was derived in their work, which could be achieved by a specific type of interaction and the corresponding measurement. However, uniqueness of an optimal interaction was left as an open problem there. We resolve this problem here and establish the uniqueness. ...
متن کاملQuantum cryptography using continuous variable Einstein-Podolsky-Rosen correlations and quadrature phase amplitude measurements
Correlations of the type discussed by EPR in their original 1935 paradox for continuous variables exist for the quadrature phase amplitudes of two spatially separated fields. These correlations were experimentally reported in 1992. We propose to use such EPR beams in quantum cryptography, to transmit predetermined messages in such a way that the receiver and sender may later determine whether e...
متن کاملEavesdropping without quantum memory
In quantum cryptography the optimal eavesdropping strategy requires that the eavesdropper uses quantum memories in order to optimize her information. What happens if the eavesdropper has no quantum memory? It is shown that the best strategy is actually to adopt the simple intercept/resend strategy.
متن کاملIncoherent and Coherent Eavesdropping in the 6-state Protocol of Quantum Cryptography
All incoherent as well as 2and 3-qubit coherent eavesdropping strategies on the 6 state protocol of quantum cryptography are classified. For a disturbance of 1/6, the optimal incoherent eavesdropping strategy reduces to the universal quantum cloning machine. Coherent eavesdropping cannot increase Eve’s Shannon information, neither on the entire string of bits, nor on the set of bits received un...
متن کاملBias-Induced Optical Absorption of Current Carrying Two-Orbital Quantum Dot with Strong Electron-Phonon Interaction (Polaron Regime)
The one photon absorption (OPA) cross section of a current carrying two-orbital quantum dot (QD) with strong electron-phonon interaction (polaron regime) is considered. Using the self-consistent non-equilibrium Hartree-Fock (HF) approximation, we determine the dependence of OPA cross section on the applied bias voltage, the strength of effective electron-electron interaction, and level spacing ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1610.07148 شماره
صفحات -
تاریخ انتشار 2016