Incoherent and coherent eavesdropping in the six-state protocol of quantum cryptography

被引:270
作者
Bechmann-Pasquinucci, H [1 ]
Gisin, N [1 ]
机构
[1] Univ Geneva, Appl Phys Grp, CH-1211 Geneva 4, Switzerland
来源
PHYSICAL REVIEW A | 1999年 / 59卷 / 06期
关键词
D O I
10.1103/PhysRevA.59.4238
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
All incoherent as well as 2- and 3-qubit coherent eavesdropping strategies on the six-state protocol of quantum cryptography are classified. For a disturbance of 1/6, the optimal incoherent eavesdropping strategy reduces to the universal quantum cloning machine. Coherent eavesdropping cannot increase Eve's Shannon information, neither on the entire string of bits, nor on the set of bits received undisturbed by Bob. However, coherent eavesdropping can increase as well Eve's Renyi information as her probability of guessing correctly all bits. The case that Eve delays the measurement of her probe until after the public discussion on error correction and privacy amplification is also considered. It is argued that by doing so, Eve gains only negligibly small additional information. [S1050-2947(99)08706-5].
引用
收藏
页码:4238 / 4248
页数:11
相关论文
共 24 条
[1]  
Bennett C. H., 1992, Journal of Cryptology, V5, P3, DOI 10.1007/BF00191318
[2]  
Bennett C. H., 1984, PROC IEEE INT C COMP, P175, DOI [DOI 10.1016/J.TCS.2014.05.025, 10.1016/j.tcs.2014.05.025]
[3]   TELEPORTING AN UNKNOWN QUANTUM STATE VIA DUAL CLASSICAL AND EINSTEIN-PODOLSKY-ROSEN CHANNELS [J].
BENNETT, CH ;
BRASSARD, G ;
CREPEAU, C ;
JOZSA, R ;
PERES, A ;
WOOTTERS, WK .
PHYSICAL REVIEW LETTERS, 1993, 70 (13) :1895-1899
[4]   Purification of noisy entanglement and faithful teleportation via noisy channels [J].
Bennett, CH ;
Brassard, G ;
Popescu, S ;
Schumacher, B ;
Smolin, JA ;
Wootters, WK .
PHYSICAL REVIEW LETTERS, 1996, 76 (05) :722-725
[5]  
BRIEGEL HJ, 1998, QUANTPH9803056
[6]   Optimal eavesdropping in quantum cryptography with six states [J].
Bruss, D .
PHYSICAL REVIEW LETTERS, 1998, 81 (14) :3018-3021
[7]  
BRUSS D, QUANTPH970538
[8]   Quantum copying: Beyond the no-cloning theorem [J].
Buzek, V ;
Hillery, M .
PHYSICAL REVIEW A, 1996, 54 (03) :1844-1852
[9]   Coherent eavesdropping strategies for the four state quantum cryptography protocol [J].
Cirac, JI ;
Gisin, N .
PHYSICS LETTERS A, 1997, 229 (01) :1-7
[10]   PROPOSED EXPERIMENT TO TEST LOCAL HIDDEN-VARIABLE THEORIES [J].
CLAUSER, JF ;
HORNE, MA ;
SHIMONY, A ;
HOLT, RA .
PHYSICAL REVIEW LETTERS, 1969, 23 (15) :880-&