Skip to main content
Log in

On a collective attack on the key in quantum cryptography on two nonorthogonal states

  • Quantum Information Science
  • Published:
Journal of Experimental and Theoretical Physics Letters Aims and scope Submit manuscript

Abstract

A “collective” attack on the key is considered, and its connection with the classical capacity of a quantum communication channel is analyzed. It has been shown that the allowable error probability for legitimate users to which the secure key can be extracted is less than half the value for “translucent” eavesdropping and individual measurements.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. S. Wiesner, SIGACT News 15, 78 (1983).

    Article  MATH  Google Scholar 

  2. C. H. Bennett and G. Brassard, in Proceedings of IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, India (IEEE, New York, 1984), p. 175; C. H. Bennett, Phys. Rev. Lett. 68, 3121 (1992).

    Google Scholar 

  3. W. K. Wootters and W. H. Zurek, Nature 299, 802 (1982).

    Article  ADS  Google Scholar 

  4. A. K. Ekert, B. Huttner, G. M. Palma, and A. Peres, Phys. Rev. A 50, 1047 (1994).

    Article  ADS  Google Scholar 

  5. H. E. Brandt, J. M. Myers, and S. J. Lomonaco, Jr., Phys. Rev. A 56, 4456 (1997).

    Article  ADS  Google Scholar 

  6. B. A. Slutsky, R. Rao, Pang-Chen Sun, and Y. Fainman, Phys. Rev. A 57, 2383 (1998).

    Article  ADS  Google Scholar 

  7. K. Tamaki, M. Koashi, and N. Imoto, quant-ph/0212161.

  8. K. Tamaki, M. Koashi, and N. Imoto, quant-ph/0212162.

  9. K. Tamaki and N. Lutkenhaus, quant-ph/0308048.

  10. E. Biham and T. Mor, Phys. Rev. Lett. 78, 2256 (1997); 79, 4034 (1997).

    Article  ADS  Google Scholar 

  11. C. E. Shannon, Bell Syst. Tech. J. 27, 397 (1948); 27, 623 (1948).

    MathSciNet  Google Scholar 

  12. R. Gallagher, Information Theory and Reliable Communication (Wiley, New York, 1968; Sovetskoe Radio, Moscow, 1974).

    Google Scholar 

  13. A. S. Kholevo, Introduction to the Quantum Theory of Information (MTsNMO, Moscow, 2002), Sovrem. Mat. Fiz., No. 5.

    Google Scholar 

  14. A. S. Kholevo, Probl. Peredachi Inf. 8, 63 (1972); 15, 3 (1979); Usp. Mat. Nauk 53, 193 (1998).

    Google Scholar 

  15. I. Csiszár and J. Körner, IEEE Trans. Inf. Theory 24, 339 (1978).

    Google Scholar 

  16. D. Maurer, IEEE Trans. Inf. Theory 39, 733 (1993).

    Article  MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Additional information

__________

Translated from Pis’ma v Zhurnal Éksperimental’no\(\overset{\lower0.5em\hbox{$\smash{\scriptscriptstyle\smile}$}}{l}\) i Teoretichesko\(\overset{\lower0.5em\hbox{$\smash{\scriptscriptstyle\smile}$}}{l}\) Fiziki, Vol. 80, No. 8, 2004, pp. 639–644.

Original Russian Text Copyright © 2004 by Molotkov.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Molotkov, S.N. On a collective attack on the key in quantum cryptography on two nonorthogonal states. Jetp Lett. 80, 563–567 (2004). https://doi.org/10.1134/1.1846120

Download citation

  • Received:

  • Issue Date:

  • DOI: https://doi.org/10.1134/1.1846120

PACS numbers

Navigation