作者: Eli Biham , Tal Mor
DOI: 10.1103/PHYSREVLETT.78.2256
关键词:
摘要: We present strong attacks against quantum key distribution schemes which use memories and gates to attack directly the final key. analyze a specific of this type, for we find density matrices available eavesdropper optimal information can be extracted from them. prove security discuss any allowed by rules mechanics.