Coherent eavesdropping strategies for the 4-state quantum cryptography protocol
Preprint
- 31 January 1997
Abstract
An elementary derivation of best eavesdropping strategies for the 4 state BB84 quantum cryptography protocol is presented, for both incoherent and two--qubit coherent attacks. While coherent attacks do not help Eve to obtain more information, they are more powerful to reveal the whole message sent by Alice. Our results are based on symmetric eavesdropping strategies, which we show to be sufficient to analyze these kind of problems.Keywords
All Related Versions
- Version 1, 1997-01-31, ArXiv
- Published version: Physics Letters A, 229 (1), 1.
This publication has 0 references indexed in Scilit: