Abstract
An undetected eavesdropping attack must produce count rate statistics that are indistinguishable from those that would arise in the absence of such an attack. In principle this constraint should force a reduction in the amount of information available to the eavesdropper. In this paper we illustrate, by considering a particular class of eavesdropping attacks, how the general analysis of this problem may proceed.
© 2001 Optical Society of America
PDF ArticleMore Like This
Taehyun Kim, Ingo Stork genannt Wersborg, Franco N. C. Wong, and Jeffrey H. Shapiro
QML6 Quantum Electronics and Laser Science Conference (CLEO:FS) 2007
Rohit K Ramakrishnan and Srinivas Talabattula
Th3A.77 International Conference on Fibre Optics and Photonics (Photonics) 2016
Swati Bhugra and Pradeep K Kumar
AF2F.29 Asia Communications and Photonics Conference (ACP) 2013