Efficiency of the eavesdropping in B92 QKD protocol with a QCM

1Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Success of any eavesdropping attack on a quantum cryptographic protocol can be reduced by the legitime users if they partially compare their data. It is important to know for the legitime users what is (necessary and enough) amount of data which should be compared to ensure that (possible) illegitime user has an arbitrary small information about the rest of data. To obtain such amount the legitime users need to know efficiencies of all possible attacks for particular cryptographic protocol. In this work we introduce the eavesdropping attack on Bennett's B92 protocol for quantum key distribution (QKD) with a quantum cloning machine (QCM). We demonstrate efficiency of suggested attack and compare it with efficiencies of alternative attacks proposed before. © Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering 2010.

Cite

CITATION STYLE

APA

Siomau, M., & Fritzsche, S. (2010). Efficiency of the eavesdropping in B92 QKD protocol with a QCM. In Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering (Vol. 36 LNICST, pp. 267–274). https://doi.org/10.1007/978-3-642-11731-2_33

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free