An Effective Attack on the Quantum Key Distribution Protocol Based on Quantum Encryption
We come up with a special attack strategy to the quantum key distribution protocol based on quantum encryption. With our strategy an eavesdropper can elicit about half of the key bits without being detected by the legal communication parties. Furthermore, the eavesdropping needs only facilities similar to that of the legal parties. Therefore, we draw a conclusion that the original protocol is insecure and, at last, a feasible improvement of the protocol is proposed.
KeywordsEntangle State Bell State Attack Strategy CNOT Operation Quantum Encryption
Unable to display preview. Download preview PDF.
- 1.Zhang, Y.-S., Li, C.-F., Guo, G.-C.: Phys. Rev. A 64, 024302 (2001)Google Scholar
- 3.Karimipour, V., Bahraminasab, A., Bagherinezhad, S.: Phys. Rev. A 65, 052331 (2002)Google Scholar
- 4.Bagherinezhad, S., Karimipour, V.: Phys. Rev. A 67, 044302 (2003)Google Scholar
- 5.Bennett, C.H., Brassard, G.: Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, India, p. 175. IEEE, New York (1984)Google Scholar