Optimal eavesdropping in quantum cryptography. I. Information bound and optimal strategy
- 1 August 1997
- journal article
- research article
- Published by American Physical Society (APS) in Physical Review A
- Vol. 56 (2) , 1163-1172
- https://doi.org/10.1103/physreva.56.1163
Abstract
We consider the Bennett-Brassard cryptographic scheme, which uses two conjugate quantum bases. An eavesdropper who attempts to obtain information on qubits sent in one of the bases causes a disturbance to qubits sent in the other basis. We derive an upper bound to the accessible information in one basis, for a given error rate in the conjugate basis. Independently fixing the error rates in the conjugate bases, we show that both bounds can be attained simultaneously by an optimal eavesdropping probe. The probe interaction and its subsequent measurement are described explicitly. These results are combined to give an expression for the optimal information an eavesdropper can obtain for a given average disturbance when her interaction and measurements are performed signal by signal. Finally, the relation between quantum cryptography and violations of Bell’s inequalities is discussed.This publication has 20 references indexed in Scilit:
- Optimal eavesdropping in quantum cryptography. II. A quantum circuitPhysical Review A, 1997
- Coherent eavesdropping strategies for the four state quantum cryptography protocolPhysics Letters A, 1997
- Security of Quantum Cryptography against Collective AttacksPhysical Review Letters, 1997
- Quantum cloning, eavesdropping and Bell's inequalityPhysics Letters A, 1997
- Quantum Privacy Amplification and the Security of Quantum Cryptography over Noisy ChannelsPhysical Review Letters, 1996
- Security against eavesdropping in quantum cryptographyPhysical Review A, 1996
- Measurement of Conditional Phase Shifts for Quantum LogicPhysical Review Letters, 1995
- Quantum Cryptography with Interferometric Quantum EntanglementJournal of Modern Optics, 1994
- Eavesdropping on quantum-cryptographical systemsPhysical Review A, 1994
- Experimental quantum cryptographyJournal of Cryptology, 1992