Expanded Conclusive Eavesdropping in Quantum Key Distribution

نویسندگان

  • Howard E. Brandt
  • John M. Myers
  • Gordon McKay
چکیده

The paper [Howard E. Brandt, ”Conclusive eavesdropping in quantum key distribution,” J. Opt. B: Quantum Semiclass. Opt. 7 (2005)] is generalized to include the full range of error rates for the projectively measured quantum cryptographic entangling probe, and also the full range of inconclusive rates for the entangling probe measured with the POVM receiver.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Improved Eavesdropping Detection in Quantum Key Distribution

Employing the fundamental laws of quantum physics, Quantum Key Distribution (QKD) promises the unconditionally secure distribution of cryptographic keys. However, in practical realisations, a QKD protocol is only secure, when the quantum bit error rate introduced by an eavesdropper unavoidably exceeds the system error rate. This condition guarantees that an eavesdropper cannot disguise his pres...

متن کامل

Unconditionally Secure Quantum Key Distribution In Higher Dimensions

In search of a quantum key distribution scheme that could stand up for more drastic eavesdropping attack, I discover a prepare-and-measure scheme using N -dimensional quantum particles as information carriers where N is a prime power. Using the Shor-Preskill-type argument, I prove that this scheme is unconditional secure against all attacks allowed by the laws of quantum physics. Incidentally, ...

متن کامل

Quantum Key Distribution between N partners: optimal eavesdropping and Bell’s inequalities

Quantum secret-sharing protocols involving N partners (NQSS) are key distribution protocols in which Alice encodes her key into N − 1 qubits, in such a way that all the other partners must cooperate in order to retrieve the key. On these protocols, several eavesdropping scenarios are possible: some partners may want to reconstruct the key without the help of the other ones, and consequently col...

متن کامل

Quantum Cryptography : Security analyses of multiuser quantum communication with embedded authentication

Three quantum cryptographic protocols of multiuser quantum networks with embedded authentication, allowing quantum key distribution or quantum direct communication, are discussed in this work (Hong et al., 2006, Lee et al., 2005, 2006). The security of the protocols against different types of attacks is analysed with a focus on various impersonation attacks and the man-in-the-middle attack. On ...

متن کامل

Eavesdropping on the Boström-Felbinger Communication Protocol in Noisy Quantum Channel

We show an eavesdropping scheme on Boström-Felbinger communication protocol ( called pingpong protocol ) [Phys. Rev. Lett. 89, 187902 (2002)] in an ideal quantum channel. A measurement attack can be perfectly used to eavesdrop Alice’s information instead of a most general quantum operation attack. In a noisy quantum channel, the direct communication is forbidden. We present a quantum key distri...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008