Optimal Eavesdropping in Quantum Cryptography with Six States
- 5 October 1998
- journal article
- research article
- Published by American Physical Society (APS) in Physical Review Letters
- Vol. 81 (14) , 3018-3021
- https://doi.org/10.1103/physrevlett.81.3018
Abstract
A generalization of the quantum cryptographic protocol by Bennett and Brassard is discussed, using three conjugate bases, i.e., six states. By calculating the optimal mutual information between sender and eavesdropper it is shown that this scheme is safer against eavesdropping on single qubits than the one based on two conjugate bases. We also address the question for a connection between the maximal classical correlation in a generalized Bell inequality and the intersection of mutual informations between sender/receiver and sender/eavesdropper.Keywords
All Related Versions
This publication has 11 references indexed in Scilit:
- Clauser-Horne-Shimony-Holt correlation and Clauser-Horne correlation do not lead to the largest violations of Bell’s inequalityPhysical Review A, 1998
- Bounds on Information and the Security of Quantum CryptographyPhysical Review Letters, 1997
- Quantum cloning, eavesdropping and Bell's inequality [Physics Letters A 228 (1997) 13]Physics Letters A, 1997
- Optimal eavesdropping in quantum cryptography. I. Information bound and optimal strategyPhysical Review A, 1997
- Quantum-state disturbance versus information gain: Uncertainty relations for quantum informationPhysical Review A, 1996
- Violating Bell inequality by mixed states: necessary and sufficient conditionPhysics Letters A, 1995
- Quantum cryptography without Bell’s theoremPhysical Review Letters, 1992
- Quantum cryptography based on Bell’s theoremPhysical Review Letters, 1991
- Wringing out better Bell inequalitiesAnnals of Physics, 1990
- Quantum generalizations of Bell's inequalityLetters in Mathematical Physics, 1980