Optimal eavesdropping in quantum cryptography. I. Information bound and optimal strategy
We consider the Bennett-Brassard cryptographic scheme, which uses two conjugate quantum bases. An eavesdropper who attempts to obtain information on qubits sent in one of the ba...