EAVESDROPPING STRATEGIES AND REJECTED-DATA PROTOCOLS IN QUANTUM CRYPTOGRAPHY

被引:31
|
作者
BARNETT, SM
HUTTNER, B
PHOENIX, SJD
机构
[1] UNIV OXFORD, CLARENDON LAB, DEPT PHYS, OXFORD OX1 3PU, OXON, ENGLAND
[2] BT LABS, IPSWICH IP5 7RE, SUFFOLK, ENGLAND
关键词
D O I
10.1080/09500349314552491
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
We show that rejected-data protocols for quantum cryptography are secure against generalized intercept/resend strategies of an eavesdropper provided that the legitimate users of the communication channel use at least three bases. We discuss the connection between this result and the recently-developed protocol based on violations of a suitably-constructed Bell-type inequality for single particles. We also give a new estimate of the probability that an eavesdropper remains undetected under the original protocol and thereby show that the optimal strategies available to an eavesdropper are further limited to those which randomize the errors between the sub-ensembles of data. This result also has implications for the way in which the legitimate users of the channel choose their test data.
引用
收藏
页码:2501 / 2513
页数:13
相关论文
共 50 条
  • [41] Quantum Computation of Perfect Time-Eavesdropping in Position-Based Quantum Cryptography Quantum Computing and Eavesdropping over Perfect Key Distribution
    Gupta, Sayantan
    Sau, Kartik
    Pramanick, Jyotirmoy
    Pyne, Swarnava
    Ahamed, Rizwan
    Biswas, Rahul
    2017 8TH ANNUAL INDUSTRIAL AUTOMATION AND ELECTROMECHANICAL ENGINEERING CONFERENCE (IEMECON), 2017, : 162 - 167
  • [42] EAVESDROPPING ON QUANTUM SECRET SHARING PROTOCOLS BASED ON RING TOPOLOGY
    Jiang, Dong
    Yang, Yongkai
    Guang, Qisheng
    Gao, Chaohui
    Chen, Lijun
    QUANTUM INFORMATION & COMPUTATION, 2019, 19 (7-8) : 587 - 600
  • [43] Eavesdropping on quantum secret sharing protocols based on ring topology
    Jiang, Dong
    Yang, Yongkai
    Guang, Qisheng
    Gao, Chaohui
    Chen, Lijun
    Quantum Information and Computation, 2019, 19 (7-8): : 587 - 600
  • [44] Optimal eavesdropping in quantum cryptography .1. Information bound and optimal strategy
    Fuchs, CA
    Gisin, N
    Griffiths, RB
    Niu, CS
    Peres, A
    PHYSICAL REVIEW A, 1997, 56 (02): : 1163 - 1172
  • [45] On Eavesdropping Strategy for Symmetric Coherent States Quantum Cryptography Using Heterodyne Measurement
    Avanesov, A. S.
    Kronberg, D. A.
    LOBACHEVSKII JOURNAL OF MATHEMATICS, 2021, 42 (10) : 2285 - 2294
  • [46] Fidelity of quantum strategies with applications to cryptography
    Gutoski, Gus
    Rosmanis, Ansis
    Sikora, Jamie
    QUANTUM, 2018, 2
  • [47] Eavesdropping optimization for quantum cryptography using a positive operator-valued measure
    Brandt, HE
    PHYSICAL REVIEW A, 1999, 59 (04): : 2665 - 2669
  • [48] On Eavesdropping Strategy for Symmetric Coherent States Quantum Cryptography Using Heterodyne Measurement
    A. S. Avanesov
    D. A. Kronberg
    Lobachevskii Journal of Mathematics, 2021, 42 : 2285 - 2294
  • [49] Reverse reconciliation protocols for quantum cryptography with continuous variables
    Grosshans, F
    Grangier, P
    QUANTUM COMMUNICATION, MEASUREMENT AND COMPUTING, PROCEEDINGS, 2003, : 351 - 356
  • [50] TOMOGRAPHIC QUANTUM CRYPTOGRAPHY PROTOCOLS ARE REFERENCE FRAME INDEPENDENT
    Le Phuc Thinh
    Sheridan, Lana
    Scarani, Valerio
    INTERNATIONAL JOURNAL OF QUANTUM INFORMATION, 2012, 10 (03)