Coherent eavesdropping strategies for the 4-state quantum cryptography protocol

Physics – Quantum Physics

Scientific paper

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

6 pages of LaTeX and 3 eps figures. Submitted to Phys. Lett. A

Scientific paper

10.1016/S0375-9601(97)00176-X

An elementary derivation of best eavesdropping strategies for the 4 state BB84 quantum cryptography protocol is presented, for both incoherent and two--qubit coherent attacks. While coherent attacks do not help Eve to obtain more information, they are more powerful to reveal the whole message sent by Alice. Our results are based on symmetric eavesdropping strategies, which we show to be sufficient to analyze these kind of problems.

No associations

LandOfFree

Say what you really think

Search LandOfFree.com for scientists and scientific papers. Rate them and share your experience with other people.

Rating

Coherent eavesdropping strategies for the 4-state quantum cryptography protocol does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.

If you have personal experience with Coherent eavesdropping strategies for the 4-state quantum cryptography protocol, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Coherent eavesdropping strategies for the 4-state quantum cryptography protocol will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFWR-SCP-O-511606

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.