EAVESDROPPING STRATEGIES AND REJECTED-DATA PROTOCOLS IN QUANTUM CRYPTOGRAPHY

被引:31
|
作者
BARNETT, SM
HUTTNER, B
PHOENIX, SJD
机构
[1] UNIV OXFORD, CLARENDON LAB, DEPT PHYS, OXFORD OX1 3PU, OXON, ENGLAND
[2] BT LABS, IPSWICH IP5 7RE, SUFFOLK, ENGLAND
关键词
D O I
10.1080/09500349314552491
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
We show that rejected-data protocols for quantum cryptography are secure against generalized intercept/resend strategies of an eavesdropper provided that the legitimate users of the communication channel use at least three bases. We discuss the connection between this result and the recently-developed protocol based on violations of a suitably-constructed Bell-type inequality for single particles. We also give a new estimate of the probability that an eavesdropper remains undetected under the original protocol and thereby show that the optimal strategies available to an eavesdropper are further limited to those which randomize the errors between the sub-ensembles of data. This result also has implications for the way in which the legitimate users of the channel choose their test data.
引用
收藏
页码:2501 / 2513
页数:13
相关论文
共 50 条