Physics – Quantum Physics
Scientific paper
2007-02-27
Quant. Inf. Comp. 8, 0622 (2008)
Physics
Quantum Physics
9 pages, 2 tables, 5 figures; v3: rewritten for clarity, a few explanations and recent references added
Scientific paper
In quantum cryptosystems, variations in detector efficiency can be exploited to stage a successful attack. This happens when the efficiencies of Bob's two detectors are different functions of a control parameter accessible to Eve (e.g., timing of the incoming pulses). It has previously been shown that the Bennett-Brassard 1984 (BB84) protocol is vulnerable to this attack. In this paper, we show that several other protocols and encodings may also be vulnerable. We consider a faked states attack in the case of a partial efficiency mismatch on the Scarani-Acin-Ribordy-Gisin 2004 (SARG04) protocol, and derive the quantum bit error rate as a function of detector efficiencies. Additionally, it is shown how faked states can in principle be constructed for quantum cryptosystems that use a phase-time encoding, the differential phase shift keying (DPSK) and the Ekert protocols.
Makarov Valeri V.
Skaar Johannes
No associations
LandOfFree
Faked states attack using detector efficiency mismatch on SARG04, phase-time, DPSK, and Ekert protocols does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with Faked states attack using detector efficiency mismatch on SARG04, phase-time, DPSK, and Ekert protocols, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Faked states attack using detector efficiency mismatch on SARG04, phase-time, DPSK, and Ekert protocols will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-525211