Eavesdropping without quantum memory

نویسنده

  • H. Bechmann-Pasquinucci
چکیده

In quantum cryptography the optimal eavesdropping strategy requires that the eavesdropper uses quantum memories in order to optimize her information. What happens if the eavesdropper has no quantum memory? It is shown that the best strategy is actually to adopt the simple intercept/resend strategy.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Improved Eavesdropping Detection in Quantum Key Distribution

Employing the fundamental laws of quantum physics, Quantum Key Distribution (QKD) promises the unconditionally secure distribution of cryptographic keys. However, in practical realisations, a QKD protocol is only secure, when the quantum bit error rate introduced by an eavesdropper unavoidably exceeds the system error rate. This condition guarantees that an eavesdropper cannot disguise his pres...

متن کامل

Quantum Key Distribution between N partners: optimal eavesdropping and Bell’s inequalities

Quantum secret-sharing protocols involving N partners (NQSS) are key distribution protocols in which Alice encodes her key into N − 1 qubits, in such a way that all the other partners must cooperate in order to retrieve the key. On these protocols, several eavesdropping scenarios are possible: some partners may want to reconstruct the key without the help of the other ones, and consequently col...

متن کامل

Attacks of BB84 protocol in quantum cryptography

An optimal eavesdropping strategy for BB84 protocol in quantum cryptography is proposed. This scheme is based on the ‘indirect copying’. Under this scheme, eavesdropper can exactly obtain the exchanged information between the legitimate users without being detected.

متن کامل

Quantum cloning of a coherent light state into an atomic quantum memory.

A scheme for the optimal Gaussian cloning of coherent light states at the interface between light and atoms is proposed. The distinct feature of this proposal is that the clones are stored in an atomic quantum memory, which is important for applications in quantum communication. The atomic quantum cloning machine requires only a single passage of the light pulse through the atomic ensembles fol...

متن کامل

Quantum Cloning, Eavesdropping and Bell’s inequality

We analyze various eavesdropping strategies on a quantum cryptographic channel. We present the optimal strategy for an eavesdropper restricted to a two-dimensional probe, interacting on-line with each transmitted signal. The link between safety of the transmission and the violation of Bell’s inequality is discussed. We also use a quantum copying machine for eavesdropping and for broadcasting qu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005