Eavesdropping without quantum memory
- Dipartimento di Fisica 'A. Volta', University of Pavia, via Bassi 6, I-27100 Pavia, Italy and UCCI.IT, via Olmo 26, I-23888 Rovagnate (Italy)
In quantum cryptography the optimal eavesdropping strategy requires that the eavesdropper uses ancillas and quantum memories in order to optimize her information. What happens if the eavesdropper has no quantum memory? It is shown that in this case the eavesdropper obtains a better information/disturbance trade-off by adopting the simple intercept/resend strategy.
- OSTI ID:
- 20787173
- Journal Information:
- Physical Review. A, Vol. 73, Issue 4; Other Information: DOI: 10.1103/PhysRevA.73.044305; (c) 2006 The American Physical Society; Country of input: International Atomic Energy Agency (IAEA); ISSN 1050-2947
- Country of Publication:
- United States
- Language:
- English
Similar Records
Entangled State Quantum Cryptography: Eavesdropping on the Ekert Protocol
Time coding protocols for quantum key distribution
Quantum cryptography: individual eavesdropping with the knowledge of the error-correcting protocol
Journal Article
·
Mon May 15 00:00:00 EDT 2000
· Physical Review Letters
·
OSTI ID:20787173
+2 more
Time coding protocols for quantum key distribution
Journal Article
·
Fri Oct 01 00:00:00 EDT 2004
· Physical Review. A
·
OSTI ID:20787173
Quantum cryptography: individual eavesdropping with the knowledge of the error-correcting protocol
Journal Article
·
Mon Dec 31 00:00:00 EST 2007
· Quantum Electronics (Woodbury, N.Y.)
·
OSTI ID:20787173