{"title":"Limits on detecting eavesdropper in QKD protocols","authors":"P. Subramaniam, Abhishek Parakh","doi":"10.1109/ANTS.2014.7057239","DOIUrl":null,"url":null,"abstract":"Quantum key distribution (QKD) protocols form a natural choice for encryption in optical networks. All the QKD protocols use errors caused due to random measurements by Eve to detect her presence. In this paper, we present a fundamental limitation of using such bases to detect an eavesdropper in two QKD protocols - the BB84 and the new quantum Diffie-Hellman key exchange protocol. It is shown that the eavesdropper will go undetected in each exchange in both the protocols at least half the time.","PeriodicalId":333503,"journal":{"name":"2014 IEEE International Conference on Advanced Networks and Telecommuncations Systems (ANTS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 IEEE International Conference on Advanced Networks and Telecommuncations Systems (ANTS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ANTS.2014.7057239","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 9
Abstract
Quantum key distribution (QKD) protocols form a natural choice for encryption in optical networks. All the QKD protocols use errors caused due to random measurements by Eve to detect her presence. In this paper, we present a fundamental limitation of using such bases to detect an eavesdropper in two QKD protocols - the BB84 and the new quantum Diffie-Hellman key exchange protocol. It is shown that the eavesdropper will go undetected in each exchange in both the protocols at least half the time.