Security of quantum cryptography against individual attacks

被引:0
作者
Slutsky, BA [1 ]
Rao, R [1 ]
Sun, PC [1 ]
Fainman, Y [1 ]
机构
[1] Univ Calif San Diego, Dept Elect & Comp Engn, La Jolla, CA 92093 USA
来源
MULITMEDIA NETWORKS: SECURITY, DISPLAYS, TERMINALS, AND GATEWAYS | 1998年 / 3228卷
关键词
quantum cryptography; security; eavesdropping strategies; information-disturbance tradeoff;
D O I
10.1117/12.300902
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
An attempt to eavesdrop a quantum cryptographic channel reveals itself through errors it inevitably introduces into the transmission. We investigate the relationship between the induced error rate and the maximum amount of information the eavesdropper can extract, both in the two-state B92 and the four-state BB84 quantum cryptographic protocols, In each case, the optimal eavesdropping method that on average yields the most information for a given error rate is explicitly constructed. Analysis is limited to eavesdropping strategies where each bit of the quantum transmission is attacked individually and independently from other bits. Subject to this restriction, however, we believe that all attacks not forbidden by physical laws are included. Unlike previous work the eavesdropper's advantage is measured in terms of Renyi (rather than Shannon) information, and with respect only to bits received error-free by Bob (rather than all bits). This alters both the maximum extractable information and the optimal eavesdropping attack. The result can be used directly at the privacy amplification stage of the protocol to accomplish secure communication over a noisy channel.
引用
收藏
页码:310 / 321
页数:12
相关论文
共 50 条
  • [1] Security of two-way quantum cryptography against asymmetric attacks
    Pirandola, Stefano
    Mancini, Stefano
    Lloyd, Seth
    Braunstein, Samuel L.
    QUANTUM COMMUNICATIONS AND QUANTUM IMAGING VI, 2008, 7092
  • [2] SECURITY OF QUANTUM SECRET SHARING WITH TWO-PARTICLE ENTANGLEMENT AGAINST INDIVIDUAL ATTACKS
    Qin, Su-Juan
    Gao, Fei
    Wen, Qiao-Yan
    Zhu, Fu-Chen
    QUANTUM INFORMATION & COMPUTATION, 2009, 9 (9-10) : 765 - 772
  • [3] Security proof of counterfactual quantum cryptography against general intercept-resend attacks and its vulnerability
    Zhang Sheng
    Wang Jian
    Tang Chao-Jing
    CHINESE PHYSICS B, 2012, 21 (06)
  • [4] Security proof of counterfactual quantum cryptography against general intercept-resend attacks and its vulnerability
    张盛
    王剑
    唐朝京
    Chinese Physics B, 2012, (06) : 37 - 44
  • [5] Unconditional security in quantum cryptography
    Mayers, D
    JOURNAL OF THE ACM, 2001, 48 (03) : 351 - 406
  • [6] Trojan-horse attacks threaten the security of practical quantum cryptography
    Jain, Nitin
    Anisimova, Elena
    Khan, Imran
    Makarov, Vadim
    Marquardt, Christoph
    Leuchs, Gerd
    NEW JOURNAL OF PHYSICS, 2014, 16
  • [7] Security of quantum key distribution against all collective attacks
    Biham, E
    Boyer, M
    Brassard, G
    van de Graaf, J
    Mor, T
    ALGORITHMICA, 2002, 34 (04) : 372 - 388
  • [8] Quantum cryptography for internet of things security
    Bhatt A.P.
    Sharma A.
    Journal of Electronic Science and Technology, 2019, 17 (03) : 213 - 220
  • [9] Quantum Cryptography - The Analysis of Security Requirements
    Niemiec, Marcin
    ICTON: 2009 11TH INTERNATIONAL CONFERENCE ON TRANSPARENT OPTICAL NETWORKS, VOLS 1 AND 2, 2009, : 814 - 817
  • [10] Quantum Cryptography for Internet of Things Security
    Alekha Parimal Bhatt
    Anand Sharma
    Journal of Electronic Science and Technology, 2019, (03) : 213 - 220