Efficiency of the Eavesdropping in B92 QKD Protocol with a QCM

نویسندگان

  • Michael Siomau
  • Stephan Fritzsche
چکیده

Success of any eavesdropping attack on a quantum cryptographic protocol can be reduced by the legitime users if they partially compare their data. It is important to know for the legitime users what is (necessary and enough) amount of data which should be compared to ensure that (possible) illegitime user has an arbitrary small information about the rest of data. To obtain such amount the legitime users need to know efficiencies of all possible attacks for particular cryptographic protocol. In this work we introduce the eavesdropping attack on Bennett’s B92 protocol for quantum key distribution (QKD) with a quantum cloning machine (QCM). We demonstrate efficiency of suggested attack and compare it with efficiencies of alternative attacks proposed before.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Improved Eavesdropping Detection in Quantum Key Distribution

Employing the fundamental laws of quantum physics, Quantum Key Distribution (QKD) promises the unconditionally secure distribution of cryptographic keys. However, in practical realisations, a QKD protocol is only secure, when the quantum bit error rate introduced by an eavesdropper unavoidably exceeds the system error rate. This condition guarantees that an eavesdropper cannot disguise his pres...

متن کامل

Defense frontier analysis of quantum cryptographic systems.

When a quantum cryptographic system operates in the presence of background noise, security of the key can be recovered by a procedure called key distillation. A key-distillation scheme effective against so-called individual (bitwise-independent) eavesdropping attacks involves sacrifice of some of the data through privacy amplification. We derive the amount of data sacrifice sufficient to defend...

متن کامل

Symmetric Incoherent Eavesdropping against MDI QKD

In this paper, we concentrate on the very recently proposed Measurement Device Independent Quantum Key Distribution (MDI QKD) protocol by Lo, Curty and Qi (PRL, 2012). In this protocol, a secret key is established between Alice and Bob with the help of an untrusted third-party called Eve. We study how one can suitably mount a symmetric incoherent eavesdropping strategy on MDI QKD considering th...

متن کامل

Efficient Reconciliation with Rate Adaptive Codes in Quantum Key Distribution

Quantum key distribution (QKD) relies on quantum and classical procedures in order to achieve the growing of a secret random string —the key— known only to the two parties executing the protocol. Limited intrinsic efficiency of the protocol, imperfect devices and eavesdropping produce errors and information leakage from which the set of measured signals —the raw key— must be stripped in order t...

متن کامل

Entanglement-based quantum key distribution without an entangled-photon source

Quantum key distribution ~QKD! has been studied extensively as a means to realize unconditionally secure communication systems. Two legal parties ~Alice and Bob! create a secret key, security of which against eavesdropping is guaranteed by the law of quantum mechanics, and use it as a one-time pad for encrypting messages. Following the first proposal that used four nonorthogonal states @Benneet...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009