Efficiency of the Eavesdropping in B92 QKD Protocol with a QCM
نویسندگان
چکیده
Success of any eavesdropping attack on a quantum cryptographic protocol can be reduced by the legitime users if they partially compare their data. It is important to know for the legitime users what is (necessary and enough) amount of data which should be compared to ensure that (possible) illegitime user has an arbitrary small information about the rest of data. To obtain such amount the legitime users need to know efficiencies of all possible attacks for particular cryptographic protocol. In this work we introduce the eavesdropping attack on Bennett’s B92 protocol for quantum key distribution (QKD) with a quantum cloning machine (QCM). We demonstrate efficiency of suggested attack and compare it with efficiencies of alternative attacks proposed before.
منابع مشابه
Improved Eavesdropping Detection in Quantum Key Distribution
Employing the fundamental laws of quantum physics, Quantum Key Distribution (QKD) promises the unconditionally secure distribution of cryptographic keys. However, in practical realisations, a QKD protocol is only secure, when the quantum bit error rate introduced by an eavesdropper unavoidably exceeds the system error rate. This condition guarantees that an eavesdropper cannot disguise his pres...
متن کاملDefense frontier analysis of quantum cryptographic systems.
When a quantum cryptographic system operates in the presence of background noise, security of the key can be recovered by a procedure called key distillation. A key-distillation scheme effective against so-called individual (bitwise-independent) eavesdropping attacks involves sacrifice of some of the data through privacy amplification. We derive the amount of data sacrifice sufficient to defend...
متن کاملSymmetric Incoherent Eavesdropping against MDI QKD
In this paper, we concentrate on the very recently proposed Measurement Device Independent Quantum Key Distribution (MDI QKD) protocol by Lo, Curty and Qi (PRL, 2012). In this protocol, a secret key is established between Alice and Bob with the help of an untrusted third-party called Eve. We study how one can suitably mount a symmetric incoherent eavesdropping strategy on MDI QKD considering th...
متن کاملEfficient Reconciliation with Rate Adaptive Codes in Quantum Key Distribution
Quantum key distribution (QKD) relies on quantum and classical procedures in order to achieve the growing of a secret random string —the key— known only to the two parties executing the protocol. Limited intrinsic efficiency of the protocol, imperfect devices and eavesdropping produce errors and information leakage from which the set of measured signals —the raw key— must be stripped in order t...
متن کاملEntanglement-based quantum key distribution without an entangled-photon source
Quantum key distribution ~QKD! has been studied extensively as a means to realize unconditionally secure communication systems. Two legal parties ~Alice and Bob! create a secret key, security of which against eavesdropping is guaranteed by the law of quantum mechanics, and use it as a one-time pad for encrypting messages. Following the first proposal that used four nonorthogonal states @Benneet...
متن کامل