Success of any eavesdropping attack on a quantum cryptographic protocol can be reduced by the legitime users if they partially compare their data. It is important to know for the legitime users what is (necessary and enough) amount of data which should be compared to ensure that (possible) illegitime user has an arbitrary small information about the rest of data. To obtain such amount the legitime users need to know efficiencies of all possible attacks for particular cryptographic protocol. In this work we introduce the eavesdropping attack on Bennett's B92 protocol for quantum key distribution (QKD) with a quantum cloning machine (QCM). We demonstrate efficiency of suggested attack and compare it with efficiencies of alternative attacks proposed before. © Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering 2010.
CITATION STYLE
Siomau, M., & Fritzsche, S. (2010). Efficiency of the eavesdropping in B92 QKD protocol with a QCM. In Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering (Vol. 36 LNICST, pp. 267–274). https://doi.org/10.1007/978-3-642-11731-2_33
Mendeley helps you to discover research relevant for your work.