Information Gain in Quantum Eavesdropping

作者: Bruno Huttner , Artur K. Ekert

DOI: 10.1080/09500349414552301

关键词:

摘要: Abstract We analyse the information obtained by an eavesdropper during various stages of a quantum cryptographic protocol associated with key distribution. provide both upper and lower limit on amount that may have leaked to at end distribution procedure. These limits are restricted intercept/resend eaves-dropping strategies. The one is higher than has been estimated so far, should be taken into account in order guarantee secrecy final key, which subsequently via so-called privacy amplification.

参考文章(12)
Dominic Welsh, Codes and Cryptography ,(1988)
Richard W. Hamming, Coding and Information Theory ,(1980)
Gilles Brassard, Modern Cryptology: A Tutorial ,(1989)
Stephen M. Barnett, Simon J. D. Phoenix, Information-theoretic limits to quantum cryptography. Physical Review A. ,vol. 48, ,(1993) , 10.1103/PHYSREVA.48.R5
Charles H. Bennett, Gilles Brassard, Jean-Marc Robert, Privacy amplification by public discussion SIAM Journal on Computing. ,vol. 17, pp. 210- 229 ,(1988) , 10.1137/0217014
Artur K. Ekert, Bruno Huttner, G. Massimo Palma, Asher Peres, Eavesdropping on quantum-cryptographical systems. Physical Review A. ,vol. 50, pp. 1047- 1056 ,(1994) , 10.1103/PHYSREVA.50.1047
Simon J. D. Phoenix, Quantum cryptography without conjugate coding. Physical Review A. ,vol. 48, pp. 96- 102 ,(1993) , 10.1103/PHYSREVA.48.96
A. D. Wyner, The Wire-Tap Channel Bell System Technical Journal. ,vol. 54, pp. 1355- 1387 ,(1975) , 10.1002/J.1538-7305.1975.TB02040.X
U.M. Maurer, Secret key agreement by public discussion from common information IEEE Transactions on Information Theory. ,vol. 39, pp. 733- 742 ,(1993) , 10.1109/18.256484