Abstract
A “collective” attack on the key is considered, and its connection with the classical capacity of a quantum communication channel is analyzed. It has been shown that the allowable error probability for legitimate users to which the secure key can be extracted is less than half the value for “translucent” eavesdropping and individual measurements.
Similar content being viewed by others
References
S. Wiesner, SIGACT News 15, 78 (1983).
C. H. Bennett and G. Brassard, in Proceedings of IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, India (IEEE, New York, 1984), p. 175; C. H. Bennett, Phys. Rev. Lett. 68, 3121 (1992).
W. K. Wootters and W. H. Zurek, Nature 299, 802 (1982).
A. K. Ekert, B. Huttner, G. M. Palma, and A. Peres, Phys. Rev. A 50, 1047 (1994).
H. E. Brandt, J. M. Myers, and S. J. Lomonaco, Jr., Phys. Rev. A 56, 4456 (1997).
B. A. Slutsky, R. Rao, Pang-Chen Sun, and Y. Fainman, Phys. Rev. A 57, 2383 (1998).
K. Tamaki, M. Koashi, and N. Imoto, quant-ph/0212161.
K. Tamaki, M. Koashi, and N. Imoto, quant-ph/0212162.
K. Tamaki and N. Lutkenhaus, quant-ph/0308048.
E. Biham and T. Mor, Phys. Rev. Lett. 78, 2256 (1997); 79, 4034 (1997).
C. E. Shannon, Bell Syst. Tech. J. 27, 397 (1948); 27, 623 (1948).
R. Gallagher, Information Theory and Reliable Communication (Wiley, New York, 1968; Sovetskoe Radio, Moscow, 1974).
A. S. Kholevo, Introduction to the Quantum Theory of Information (MTsNMO, Moscow, 2002), Sovrem. Mat. Fiz., No. 5.
A. S. Kholevo, Probl. Peredachi Inf. 8, 63 (1972); 15, 3 (1979); Usp. Mat. Nauk 53, 193 (1998).
I. Csiszár and J. Körner, IEEE Trans. Inf. Theory 24, 339 (1978).
D. Maurer, IEEE Trans. Inf. Theory 39, 733 (1993).
Author information
Authors and Affiliations
Additional information
__________
Translated from Pis’ma v Zhurnal Éksperimental’no\(\overset{\lower0.5em\hbox{$\smash{\scriptscriptstyle\smile}$}}{l}\) i Teoretichesko\(\overset{\lower0.5em\hbox{$\smash{\scriptscriptstyle\smile}$}}{l}\) Fiziki, Vol. 80, No. 8, 2004, pp. 639–644.
Original Russian Text Copyright © 2004 by Molotkov.
Rights and permissions
About this article
Cite this article
Molotkov, S.N. On a collective attack on the key in quantum cryptography on two nonorthogonal states. Jetp Lett. 80, 563–567 (2004). https://doi.org/10.1134/1.1846120
Received:
Issue Date:
DOI: https://doi.org/10.1134/1.1846120