EAVESDROPPING STRATEGIES AND REJECTED-DATA PROTOCOLS IN QUANTUM CRYPTOGRAPHY

被引:31
|
作者
BARNETT, SM
HUTTNER, B
PHOENIX, SJD
机构
[1] UNIV OXFORD, CLARENDON LAB, DEPT PHYS, OXFORD OX1 3PU, OXON, ENGLAND
[2] BT LABS, IPSWICH IP5 7RE, SUFFOLK, ENGLAND
关键词
D O I
10.1080/09500349314552491
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
We show that rejected-data protocols for quantum cryptography are secure against generalized intercept/resend strategies of an eavesdropper provided that the legitimate users of the communication channel use at least three bases. We discuss the connection between this result and the recently-developed protocol based on violations of a suitably-constructed Bell-type inequality for single particles. We also give a new estimate of the probability that an eavesdropper remains undetected under the original protocol and thereby show that the optimal strategies available to an eavesdropper are further limited to those which randomize the errors between the sub-ensembles of data. This result also has implications for the way in which the legitimate users of the channel choose their test data.
引用
收藏
页码:2501 / 2513
页数:13
相关论文
共 50 条
  • [21] Entangled state quantum cryptography: Eavesdropping on the Ekert protocol
    Naik, DS
    Peterson, CG
    White, AG
    Berglund, AJ
    Kwiat, PG
    PHYSICAL REVIEW LETTERS, 2000, 84 (20) : 4733 - 4736
  • [22] Design of Quantum Communication Protocols in Quantum Cryptography
    Alhayani, Bilal A.
    AlKawak, Omar A.
    Mahajan, Hemant B.
    Ilhan, Haci
    Qasem, Roa'a Mohammed
    WIRELESS PERSONAL COMMUNICATIONS, 2023,
  • [23] Optimal eavesdropping strategies in quantum cryptography using photonic quantum control - art. no. 67100U
    Bartlett, Stephen D.
    QUANTUM COMMUNICATIONS AND QUANTUM IMAGING V, 2007, 6710 : U7100 - U7100
  • [24] THE FORMAL STUDY OF QUANTUM CRYPTOGRAPHY PROTOCOLS
    Yang, Fan
    Hao, Yu-Jie
    2013 10TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICCWAMTIP), 2013, : 29 - 33
  • [25] On Eavesdropping in Quantum Cryptography through Side Channels of Information Leakage
    Molotkov, S. N.
    JETP LETTERS, 2020, 111 (11) : 653 - 661
  • [26] On Eavesdropping in Quantum Cryptography through Side Channels of Information Leakage
    S. N. Molotkov
    JETP Letters, 2020, 111 : 653 - 661
  • [27] Incoherent and coherent eavesdropping in the six-state of quantum cryptography
    Bechmann-Pasquinucci, H.
    Gisin, N.
    Physical Review A. Atomic, Molecular, and Optical Physics, 1999, 59 (06):
  • [28] Optimal eavesdropping in cryptography with three-dimensional quantum states
    Bruss, D
    Macchiavello, C
    PHYSICAL REVIEW LETTERS, 2002, 88 (12) : 4
  • [29] Quantum Cryptography and Quantum Key Distribution Protocols: A Survey
    Padmavathi, V.
    Vardhan, B. Vishnu
    Krishna, A. V. N.
    2016 IEEE 6TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (IACC), 2016, : 556 - 562
  • [30] QUANTUM CRYPTOGRAPHY AND COMPARISON OF QUANTUM KEY DISTRIBUTION PROTOCOLS
    Gumus, Ergun
    Aydin, G. Zeynep
    Aydin, M. Ali
    ISTANBUL UNIVERSITY-JOURNAL OF ELECTRICAL AND ELECTRONICS ENGINEERING, 2008, 8 (01): : 503 - 510