9702002v1

related topics
{alice, bob, state}
{key, protocol, security}
{states, state, optimal}
{operator, operators, space}
{cos, sin, state}
{state, states, coherent}
{bell, inequality, local}
{light, field, probe}
{information, entropy, channel}
{measurement, state, measurements}

Coherent eavesdropping strategies for the 4-state quantum cryptography protocol

J. I. Cirac, N. Gisin

abstract: An elementary derivation of best eavesdropping strategies for the 4 state BB84 quantum cryptography protocol is presented, for both incoherent and two--qubit coherent attacks. While coherent attacks do not help Eve to obtain more information, they are more powerful to reveal the whole message sent by Alice. Our results are based on symmetric eavesdropping strategies, which we show to be sufficient to analyze these kind of problems.

oai_identifier:
oai:arXiv.org:quant-ph/9702002
categories:
quant-ph
comments:
6 pages of LaTeX and 3 eps figures. Submitted to Phys. Lett. A
doi:
10.1016/S0375-9601(97)00176-X
arxiv_id:
quant-ph/9702002
created:
1997-01-31

Full article ▸

related documents
0009006v5
0001046v1
0102060v1
0304141v3
0504150v2
0004095v1
0702155v3
0309167v2
0311168v1
0011083v2
0107074v4
0312223v1
0303184v1
0102004v2
9909030v2
0311154v2
0501075v1
0604009v1
0508002v2
0510029v1
0201073v1
0509189v2
0602016v3
0408134v1
0406179v1