Conclusive eavesdropping in quantum key distribution

H. Brandt
{"title":"Conclusive eavesdropping in quantum key distribution","authors":"H. Brandt","doi":"10.1088/1464-4266/7/12/017","DOIUrl":null,"url":null,"abstract":"It is argued that the BB84 (Bennett–Brassard 1984) protocol of quantum key distribution has a vulnerability similar to the well-known vulnerability of the B92 (Bennett 1992) protocol in the presence of losses. The quantum circuit and design are first reviewed for an optimized entangling probe attacking the BB84 protocol of quantum key distribution and yielding maximum information to the probe. Probe photon polarization states become optimally entangled with the signal states on their way between the legitimate transmitter and receiver. Although standard von Neumann projective measurements of the probe yield maximum information on the pre-privacy amplified key, if instead the probe measurements are performed with a certain positive operator valued measure, then the measurement results are unambiguous, at least some of the time, resulting in complete information gain by the probe for sufficient loss in the key distribution channel.","PeriodicalId":87441,"journal":{"name":"Journal of optics. B, Quantum and semiclassical optics : journal of the European Optical Society","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2005-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1088/1464-4266/7/12/017","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of optics. B, Quantum and semiclassical optics : journal of the European Optical Society","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1088/1464-4266/7/12/017","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

Abstract

It is argued that the BB84 (Bennett–Brassard 1984) protocol of quantum key distribution has a vulnerability similar to the well-known vulnerability of the B92 (Bennett 1992) protocol in the presence of losses. The quantum circuit and design are first reviewed for an optimized entangling probe attacking the BB84 protocol of quantum key distribution and yielding maximum information to the probe. Probe photon polarization states become optimally entangled with the signal states on their way between the legitimate transmitter and receiver. Although standard von Neumann projective measurements of the probe yield maximum information on the pre-privacy amplified key, if instead the probe measurements are performed with a certain positive operator valued measure, then the measurement results are unambiguous, at least some of the time, resulting in complete information gain by the probe for sufficient loss in the key distribution channel.
量子密钥分发中的结论性窃听
有人认为,量子密钥分发的BB84 (Bennett - brassard 1984)协议与众所周知的B92 (Bennett 1992)协议在存在损失的情况下存在类似的漏洞。首先介绍了一种针对BB84量子密钥分发协议的纠缠探针的量子电路和设计,该探针可以获得最大的信息。探针光子偏振态在合法的发射端和接收端之间与信号态发生最佳纠缠。虽然探针的标准冯·诺伊曼投影测量在预隐私放大密钥上产生了最大的信息,但如果用某个正算子值测量来代替探针测量,那么测量结果是明确的,至少在某些时候,导致探针获得完整的信息,而在密钥分发通道中有足够的损失。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信