Abstract | ||
---|---|---|
Success of any eavesdropping attack on a quantum crypto-graphic protocol can be reduced by the legitime users if they partially compare their data. It is important to know for the legitime users what is (necessary and enough) amount of data which should be compared to ensure that (possible) illegitime user has an arbitrary small information about the rest of data. To obtain such amount the legitime users need to know efficiencies of all possible attacks for particular cryptographic protocol. In this work we introduce the eavesdropping attack on Bennett's B92 protocol for quantum key distribution (QKD) with a quantum cloning machine (QCM). We demonstrate efficiency of suggested attack and compare it with efficiencies of alternative attacks proposed before. |
Year | DOI | Venue |
---|---|---|
2009 | 10.1007/978-3-642-11731-2_33 | Lecture Notes of the Institute for Computer Sciences Social Informatics and Telecommunications Engineering |
Keywords | Field | DocType |
B92 QKD protocol,QCM,mutual information,discrepancy | Quantum key distribution,Quantum,Eavesdropping,Cryptographic protocol,Computer security,Quantum cloning,Computer science,Computer network,Otway–Rees protocol,Need to know,Mutual information | Conference |
Volume | ISSN | Citations |
36 | 1867-8211 | 0 |
PageRank | References | Authors |
0.34 | 3 | 2 |
Name | Order | Citations | PageRank |
---|---|---|---|
Michael Siomau | 1 | 0 | 0.34 |
Stephan Fritzsche | 2 | 5 | 2.64 |