|
related topics |
{alice, bob, state} |
{key, protocol, security} |
{states, state, optimal} |
{operator, operators, space} |
{cos, sin, state} |
{state, states, coherent} |
{bell, inequality, local} |
{light, field, probe} |
{information, entropy, channel} |
{measurement, state, measurements} |
|
Coherent eavesdropping strategies for the 4-state quantum cryptography
protocol
J. I. Cirac, N. Gisin
abstract: An elementary derivation of best eavesdropping strategies for the 4 state
BB84 quantum cryptography protocol is presented, for both incoherent and
two--qubit coherent attacks. While coherent attacks do not help Eve to obtain
more information, they are more powerful to reveal the whole message sent by
Alice. Our results are based on symmetric eavesdropping strategies, which we
show to be sufficient to analyze these kind of problems.
- oai_identifier:
- oai:arXiv.org:quant-ph/9702002
- categories:
- quant-ph
- comments:
- 6 pages of LaTeX and 3 eps figures. Submitted to Phys. Lett. A
- doi:
- 10.1016/S0375-9601(97)00176-X
- arxiv_id:
- quant-ph/9702002
- created:
- 1997-01-31
Full article ▸
|
|
related documents |
0009006v5 |
0001046v1 |
0102060v1 |
0304141v3 |
0504150v2 |
0004095v1 |
0702155v3 |
0309167v2 |
0311168v1 |
0011083v2 |
0107074v4 |
0312223v1 |
0303184v1 |
0102004v2 |
9909030v2 |
0311154v2 |
0501075v1 |
0604009v1 |
0508002v2 |
0510029v1 |
0201073v1 |
0509189v2 |
0602016v3 |
0408134v1 |
0406179v1 |
|