Physics – Quantum Physics
Scientific paper
2001-06-06
Physics
Quantum Physics
Typo in eq.(5) corrected; Figure replaced with graph for alpha=0.01; No change in final conclusions
Scientific paper
An undetected eavesdropping attack must produce count rate statistics that are indistinguishable from those that would arise in the absence of such an attack. In principle this constraint should force a reduction in the amount of information available to the eavesdropper. In this paper we illustrate, by considering a particular class of eavesdropping attacks, how the general analysis of this problem may proceed.
Gilbert Gerald
Hamrick Michael
No associations
LandOfFree
Constraints on Eavesdropping on the BB84 Protocol does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with Constraints on Eavesdropping on the BB84 Protocol, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Constraints on Eavesdropping on the BB84 Protocol will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-459523