Abstract
It is shown that an existing method to study ideal individual attacks on the BB84 QKD protocol using error discard can be adapted to reconciliation with error correction, and that an optimal attack can be explicitly found. Moreover, this attack fills Luetkenhaus bound, independently of whether error positions are leaked to Eve, proving that it is tight. In addition, we clarify why the existence of such optimal attacks is not in contradiction with the established ``old-style'' theory of BB84 individual attacks, as incorrectly suggested recently in a news feature.
| Original language | English |
|---|---|
| Pages (from-to) | 395–406 |
| Journal | European Physical Journal D |
| Volume | 46 |
| Issue number | 2 |
| DOIs | |
| Publication status | Published - Feb 2008 |
Austrian Fields of Science 2012
- 103026 Quantum optics
- 103025 Quantum mechanics
- 103036 Theoretical physics
Keywords
- quant-ph
Fingerprint
Dive into the research topics of 'On the optimality of individual entangling-probe attacks against BB84 quantum key distribution'. Together they form a unique fingerprint.Projects
- 1 Finished
-
SECOQC: Development of a global network for secure communication based on quantum cryptography
Zeilinger, A. (Project Lead) & Rupp, R. (Admin)
1/04/04 → 31/03/08
Project: Research funding
Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver