Conclusive eavesdropping in quantum key distribution

被引:3
|
作者
Brandt, HE [1 ]
机构
[1] US Army Res Lab, Adelphi, MD USA
关键词
quantum cryptography; quantum key distribution; quantum communication; quantum computer; entanglement;
D O I
10.1088/1464-4266/7/12/017
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
It is argued that the BB84 (Bennett-Brassard 1984) protocol of quantum key distribution has a vulnerability similar to the well-known vulnerability of the B92 (Bennett 1992) protocol in the presence of losses. The quantum circuit and design are first reviewed for an optimized entangling probe attacking the BB84 protocol of quantum key distribution and yielding maximum information to the probe. Probe photon polarization states become optimally entangled with the signal states on their way between the legitimate transmitter and receiver. Although, standard von Neumann projective measurements of the probe yield maximum information on the pre-privacy amplified key, if instead the probe measurements are performed with a certain positive operator valued measure, then the measurement results are unambiguous, at least some of the time, resulting in complete information gain by the probe for sufficient loss in the key distribution channel.
引用
收藏
页码:S553 / S556
页数:4
相关论文
共 50 条
  • [1] On conclusive eavesdropping and measures of mutual information in quantum key distribution
    Alexey E. Rastegin
    Quantum Information Processing, 2016, 15 : 1225 - 1239
  • [2] On conclusive eavesdropping and measures of mutual information in quantum key distribution
    Rastegin, Alexey E.
    QUANTUM INFORMATION PROCESSING, 2016, 15 (03) : 1225 - 1239
  • [3] Entangled eavesdropping in quantum key distribution
    Brandt, Howard E.
    JOURNAL OF MODERN OPTICS, 2006, 53 (16-17) : 2251 - 2257
  • [4] Optimal eavesdropping on quantum key distribution without quantum memory
    Bocquet, Aurelien
    Alleaume, Romain
    Leverrier, Anthony
    JOURNAL OF PHYSICS A-MATHEMATICAL AND THEORETICAL, 2012, 45 (02)
  • [5] OPTIMAL EAVESDROPPING ON NOISY STATES IN QUANTUM KEY DISTRIBUTION
    Shadman, Z.
    Kampermann, H.
    Meyer, T.
    Bruss, D.
    INTERNATIONAL JOURNAL OF QUANTUM INFORMATION, 2009, 7 (01) : 297 - 306
  • [6] Eavesdropping on counterfactual quantum key distribution with finite resources
    Liu, Xingtong
    Zhang, Bo
    Wang, Jian
    Tang, Chaojing
    Zhao, Jingjing
    Zhang, Sheng
    PHYSICAL REVIEW A, 2014, 90 (02):
  • [7] Symmetric collective attacks for the eavesdropping of symmetric quantum key distribution
    Pirandola, Stefano
    INTERNATIONAL JOURNAL OF QUANTUM INFORMATION, 2008, 6 : 765 - 771
  • [8] MIMO Terahertz Quantum Key Distribution Under Restricted Eavesdropping
    Kundu, Neel Kanth
    Mckay, Matthew R.
    Conti, Andrea
    Mallik, Ranjan K.
    Win, Moe Z.
    IEEE TRANSACTIONS ON QUANTUM ENGINEERING, 2023, 4
  • [9] Faint laser quantum key distribution:: eavesdropping exploiting multiphoton pulses
    Félix, S
    Gisin, N
    Stefanov, A
    Zbinden, H
    JOURNAL OF MODERN OPTICS, 2001, 48 (13) : 2009 - 2021
  • [10] Eavesdropping Detection in BB84 Quantum Key Distribution Protocols
    Lee, Chankyun
    Sohn, Ilkwon
    Lee, Wonhyuk
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2022, 19 (03): : 2689 - 2701