Security of EPR-based quantum cryptography against incoherent symmetric attacks

被引:42
作者
Inamori, H [1 ]
Rallan, L [1 ]
Vedral, V [1 ]
机构
[1] Univ Oxford, Clarendon Lab, Ctr Quantum Computat, Oxford OX1 3PU, England
来源
JOURNAL OF PHYSICS A-MATHEMATICAL AND GENERAL | 2001年 / 34卷 / 35期
关键词
D O I
10.1088/0305-4470/34/35/317
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
We investigate a new strategy for incoherent eavesdropping in Ekert's entanglement-based quantum key distribution protocol. We show that under certain assumptions of symmetry the effectiveness of this strategy reduces to that of the original single-qubit protocol of Bennett and Brassard.
引用
收藏
页码:6913 / 6918
页数:6
相关论文
共 14 条
[1]  
Bennett C. H., 1984, PROC IEEE INT C COMP, P175, DOI [DOI 10.1016/J.TCS.2014.05.025, 10.1016/j.tcs.2014.05.025]
[2]   QUANTUM CRYPTOGRAPHY WITHOUT BELL THEOREM [J].
BENNETT, CH ;
BRASSARD, G ;
MERMIN, ND .
PHYSICAL REVIEW LETTERS, 1992, 68 (05) :557-559
[3]  
BIHAM E, 1999, QUANTPH9912053
[4]  
Brassard G., 1994, LECT NOTES COMPUTER, V765, P410, DOI [DOI 10.1007/3-540-48285-7_35, 10.1007/3-540-48285-7_35]
[5]  
CIRAC JI, 1997, QUANTPH9702002
[6]   QUANTUM CRYPTOGRAPHY BASED ON BELL THEOREM [J].
EKERT, AK .
PHYSICAL REVIEW LETTERS, 1991, 67 (06) :661-663
[7]   Quantum-state disturbance versus information gain: Uncertainty relations for quantum information [J].
Fuchs, CA ;
Peres, A .
PHYSICAL REVIEW A, 1996, 53 (04) :2038-2045
[8]  
Helstrom C., 1976, QUANTUM DETECTION ES
[9]   Unconditional security of quantum key distribution over arbitrarily long distances [J].
Lo, HK ;
Chau, HF .
SCIENCE, 1999, 283 (5410) :2050-2056
[10]  
MAYERS D, 2001, IN PRESS J ACM