Abstract
All incoherent as well as 2- and 3-qubit coherent eavesdropping strategies on the 6 state protocol of quantum cryptography are classified. For a disturbance of 1/6, the optimal incoherent eavesdropping strategy reduces to the universal quantum cloning machine. Coherent eavesdropping cannot increase Eve's Shannon information, neither on the entire string of bits, nor on the set of bits received undisturbed by Bob. However, coherent eavesdropping can increase as well Eve's Renyi information as her probability of guessing correctly all bits. The case that Eve delays the measurement of her probe until after the public discussion on error correction and privacy amplification is also considered. It is argued that by doing so, Eve gains only a negligibly small additional information.
Keywords
Affiliated Institutions
Related Publications
Quantum cryptography based on Bell’s theorem
Practical application of the generalized Bell's theorem in the so-called key distribution process in cryptography is reported. The proposed scheme is based on the Bohm's version...
Quantum Computing in the NISQ era and beyond
Noisy Intermediate-Scale Quantum (NISQ) technology will be available in the near future. Quantum computers with 50-100 qubits may be able to perform tasks which surpass the capa...
INFORMATION THEORY AND STIMULUS‐INDEPENDENT THOUGHT
The production of stimulus‐independent thought (e.g. fantasy and imagery) was measured as a function of the rate at which information was presented to human subjects. Informatio...
Information Theory: Coding Theorems for Discrete Memoryless Systems
Csiszár and Körner's book is widely regarded as a classic in the field of information theory, providing deep insights and expert treatment of the key theoretical issues. It incl...
Rethinking the Inception Architecture for Computer Vision
Convolutional networks are at the core of most state of-the-art computer vision solutions for a wide variety of tasks. Since 2014 very deep convolutional networks started to bec...
Publication Info
- Year
- 1999
- Type
- article
- Volume
- 59
- Issue
- 6
- Pages
- 4238-4248
- Citations
- 350
- Access
- Closed
External Links
Social Impact
Social media, news, blog, policy document mentions
Citation Metrics
Cite This
Identifiers
- DOI
- 10.1103/physreva.59.4238