Constraints on Eavesdropping on the BB84 Protocol
نویسندگان
چکیده
An undetected eavesdropping attack must produce count rate statistics that are indistinguishable from those that would arise in the absence of such an attack. In principle this constraint should force a reduction in the amount of information available to the eavesdropper. In this paper we illustrate, by considering a particular class of eavesdropping attacks, how the general analysis of this problem may proceed. ∗ This research was supported by MITRE under MITRE Sponsored Research Grant 51MSR837. † [email protected] ‡ [email protected]
منابع مشابه
Revisiting Symmetric Incoherent Optimal Eavesdropping in BB84 Protocol
The famous BB84 protocol relies on the conjugate bases Z = {|0〉, |1〉} and X = {|+〉, |−〉}, where |+〉 = |0〉+|1〉 √ 2 and |−〉 = |0〉−|1〉 √ 2 . Fuchs et. al. (Phy. Rev. A, 1997) presented an optimal eavesdropping strategy on the four-state BB84 protocol. Later Bruß (Phys. Rev. Lett., 1998) described the use of the basis { |0〉+i|1〉 √ 2 , |0〉−i|1〉 √ 2 } along with the above two to show that the BB84 pr...
متن کاملAttacks of BB84 protocol in quantum cryptography
An optimal eavesdropping strategy for BB84 protocol in quantum cryptography is proposed. This scheme is based on the ‘indirect copying’. Under this scheme, eavesdropper can exactly obtain the exchanged information between the legitimate users without being detected.
متن کاملAnother Look at Symmetric Incoherent Optimal Eavesdropping against BB84
The BB84 protocol is used by Alice (the sender) and Bob (the receiver) to settle on a secret classical bit-string by communicating qubits over an insecure quantum channel where Eve (the Eavesdropper) can have access. In this paper, we revisit a well known eavesdropping technique against BB84. We claim that there exist certain gaps in understanding the existing eavesdropping strategy in terms of...
متن کاملEavesdropping in semiquantum key distribution protocol
The quantum key distribution protocol with classical Bob, well known as semiquantum key distribution, has been proposed a few years back (Boyer et al., PRL 2007, PRA 2009). In this protocol Alice has the same capability as in the traditional BB84 protocol, but Bob is limited by the constraint that he can measure or prepare qubits only in {|0〉, |1〉} basis and reflect any other qubit (or in other...
متن کاملReply to Comment: Quantum Cryptography Based on Orthogonal States?
Peres [1] claims that our protocol [2] does not present any novel feature, and it is very similar to the oldest protocol of Bennett and Brassard [3] (BB84). We completely disagree with this claim and with other points raised in the Comment. The essential novelty of our protocol is that the carrier of information is in a quantum state belonging to a definite set of orthonormal states. Any other ...
متن کامل