{"title":"针对BBM92协议的个体攻击的信息干扰权衡","authors":"Chun Zhou, Wansu Bao, Xiangqun Fu","doi":"10.1109/CMC.2010.173","DOIUrl":null,"url":null,"abstract":"This paper addresses an individual attack strategy against BBM92 protocol. By constructing a map from the measurement result to the initial state, we find this individual attack is essentially equivalent to the discrimination attack against BB84 protocol. The optimal tradeoff between the guessing capability and disturbance quantity is explicitly deducted and the optimal measurement that saturates the tradeoff bound is also presented.","PeriodicalId":296445,"journal":{"name":"2010 International Conference on Communications and Mobile Computing","volume":"28 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Information-Disturbance Tradeoff of Individual Attack Against BBM92 Protocol\",\"authors\":\"Chun Zhou, Wansu Bao, Xiangqun Fu\",\"doi\":\"10.1109/CMC.2010.173\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper addresses an individual attack strategy against BBM92 protocol. By constructing a map from the measurement result to the initial state, we find this individual attack is essentially equivalent to the discrimination attack against BB84 protocol. The optimal tradeoff between the guessing capability and disturbance quantity is explicitly deducted and the optimal measurement that saturates the tradeoff bound is also presented.\",\"PeriodicalId\":296445,\"journal\":{\"name\":\"2010 International Conference on Communications and Mobile Computing\",\"volume\":\"28 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-04-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 International Conference on Communications and Mobile Computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CMC.2010.173\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 International Conference on Communications and Mobile Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CMC.2010.173","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Information-Disturbance Tradeoff of Individual Attack Against BBM92 Protocol
This paper addresses an individual attack strategy against BBM92 protocol. By constructing a map from the measurement result to the initial state, we find this individual attack is essentially equivalent to the discrimination attack against BB84 protocol. The optimal tradeoff between the guessing capability and disturbance quantity is explicitly deducted and the optimal measurement that saturates the tradeoff bound is also presented.