Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group
  • Optical Fiber Communication Conference and International Conference on Quantum Information
  • 2001 OSA Technical Digest Series (Optica Publishing Group, 2001),
  • paper PA1
  • https://doi.org/10.1364/ICQI.2001.PA1

Constraints on Eavesdropping on the BB84 Protocol

Not Accessible

Your library or personal account may give you access

Abstract

An undetected eavesdropping attack must produce count rate statistics that are indistinguishable from those that would arise in the absence of such an attack. In principle this constraint should force a reduction in the amount of information available to the eavesdropper. In this paper we illustrate, by considering a particular class of eavesdropping attacks, how the general analysis of this problem may proceed.

© 2001 Optical Society of America

PDF Article
More Like This
Complete Physical Simulation of the Entangling-probe Attack on the BB84 Protocol

Taehyun Kim, Ingo Stork genannt Wersborg, Franco N. C. Wong, and Jeffrey H. Shapiro
QML6 Quantum Electronics and Laser Science Conference (CLEO:FS) 2007

High Dimensional Quantum Key Distribution: BB84 Protocol using qudits

Rohit K Ramakrishnan and Srinivas Talabattula
Th3A.77 International Conference on Fibre Optics and Photonics (Photonics) 2016

Higher-order Modulation for BB84 QKD Protocol

Swati Bhugra and Pradeep K Kumar
AF2F.29 Asia Communications and Photonics Conference (ACP) 2013

Select as filters


Select Topics Cancel
© Copyright 2024 | Optica Publishing Group. All rights reserved, including rights for text and data mining and training of artificial technologies or similar technologies.