Constraints on Eavesdropping on the BB84 Protocol

نویسندگان

  • G. Gilbert
  • M. Hamrick
  • Michael Hamrick
چکیده

An undetected eavesdropping attack must produce count rate statistics that are indistinguishable from those that would arise in the absence of such an attack. In principle this constraint should force a reduction in the amount of information available to the eavesdropper. In this paper we illustrate, by considering a particular class of eavesdropping attacks, how the general analysis of this problem may proceed. ∗ This research was supported by MITRE under MITRE Sponsored Research Grant 51MSR837. † [email protected][email protected]

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Revisiting Symmetric Incoherent Optimal Eavesdropping in BB84 Protocol

The famous BB84 protocol relies on the conjugate bases Z = {|0〉, |1〉} and X = {|+〉, |−〉}, where |+〉 = |0〉+|1〉 √ 2 and |−〉 = |0〉−|1〉 √ 2 . Fuchs et. al. (Phy. Rev. A, 1997) presented an optimal eavesdropping strategy on the four-state BB84 protocol. Later Bruß (Phys. Rev. Lett., 1998) described the use of the basis { |0〉+i|1〉 √ 2 , |0〉−i|1〉 √ 2 } along with the above two to show that the BB84 pr...

متن کامل

Attacks of BB84 protocol in quantum cryptography

An optimal eavesdropping strategy for BB84 protocol in quantum cryptography is proposed. This scheme is based on the ‘indirect copying’. Under this scheme, eavesdropper can exactly obtain the exchanged information between the legitimate users without being detected.

متن کامل

Another Look at Symmetric Incoherent Optimal Eavesdropping against BB84

The BB84 protocol is used by Alice (the sender) and Bob (the receiver) to settle on a secret classical bit-string by communicating qubits over an insecure quantum channel where Eve (the Eavesdropper) can have access. In this paper, we revisit a well known eavesdropping technique against BB84. We claim that there exist certain gaps in understanding the existing eavesdropping strategy in terms of...

متن کامل

Eavesdropping in semiquantum key distribution protocol

The quantum key distribution protocol with classical Bob, well known as semiquantum key distribution, has been proposed a few years back (Boyer et al., PRL 2007, PRA 2009). In this protocol Alice has the same capability as in the traditional BB84 protocol, but Bob is limited by the constraint that he can measure or prepare qubits only in {|0〉, |1〉} basis and reflect any other qubit (or in other...

متن کامل

Reply to Comment: Quantum Cryptography Based on Orthogonal States?

Peres [1] claims that our protocol [2] does not present any novel feature, and it is very similar to the oldest protocol of Bennett and Brassard [3] (BB84). We completely disagree with this claim and with other points raised in the Comment. The essential novelty of our protocol is that the carrier of information is in a quantum state belonging to a definite set of orthonormal states. Any other ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2001