Physics – Quantum Physics
Scientific paper
1998-07-16
Physics
Quantum Physics
17 pages, 4 figures: Updated version, discussion on error correction and privacy amplification added
Scientific paper
10.1103/PhysRevA.59.4238
All incoherent as well as 2- and 3-qubit coherent eavesdropping strategies on the 6 state protocol of quantum cryptography are classified. For a disturbance of 1/6, the optimal incoherent eavesdropping strategy reduces to the universal quantum cloning machine. Coherent eavesdropping cannot increase Eve's Shannon information, neither on the entire string of bits, nor on the set of bits received undisturbed by Bob. However, coherent eavesdropping can increase as well Eve's Renyi information as her probability of guessing correctly all bits. The case that Eve delays the measurement of her probe until after the public discussion on error correction and privacy amplification is also considered. It is argued that by doing so, Eve gains only a negligibly small additional information.
Bechmann-Pasquinucci Helle
Gisin Nicolas
No associations
LandOfFree
Incoherent and Coherent Eavesdropping in the 6-state Protocol of Quantum Cryptography does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with Incoherent and Coherent Eavesdropping in the 6-state Protocol of Quantum Cryptography, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Incoherent and Coherent Eavesdropping in the 6-state Protocol of Quantum Cryptography will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-83471