Eavesdropping Strategies and Rejected-data Protocols in Quantum Cryptography
- 1 December 1993
- journal article
- research article
- Published by Taylor & Francis in Journal of Modern Optics
- Vol. 40 (12) , 2501-2513
- https://doi.org/10.1080/09500349314552491
Abstract
We show that rejected-data protocols for quantum cryptography are secure against generalized intercept/resend strategies of an eavesdropper provided that the legitimate users of the communication channel use at least three bases. We discuss the connection between this result and the recently-developed protocol based on violations of a suitably-constructed Bell-type inequality for single particles. We also give a new estimate of the probability that an eavesdropper remains undetected under the original protocol and thereby show that the optimal strategies available to an eavesdropper are further limited to those which randomize the errors between the sub-ensembles of data. This result also has implications for the way in which the legitimate users of the channel choose their test data.Keywords
This publication has 12 references indexed in Scilit:
- Information-theoretic limits to quantum cryptographyPhysical Review A, 1993
- Quantum cryptography without conjugate codingPhysical Review A, 1993
- Single photon interference in 10 km long optical fibre interferometerElectronics Letters, 1993
- On A Fundamental Theorem of Quantum CryptographyJournal of Modern Optics, 1993
- Practical quantum cryptography based on two-photon interferometryPhysical Review Letters, 1992
- Quantum cryptography using any two nonorthogonal statesPhysical Review Letters, 1992
- Experimental quantum cryptographyJournal of Cryptology, 1992
- Quantum cryptography based on Bell’s theoremPhysical Review Letters, 1991
- Privacy Amplification by Public DiscussionSIAM Journal on Computing, 1988
- Conjugate codingACM SIGACT News, 1983