INFORMATION GAIN IN QUANTUM EAVESDROPPING

被引:63
作者
HUTTNER, B
EKERT, AK
机构
[1] UNIV OXFORD MERTON COLL, OXFORD OX1 4JD, ENGLAND
[2] UNIV OXFORD, DEPT PHYS, OXFORD OX1 4JD, ENGLAND
关键词
D O I
10.1080/09500349414552301
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
We analyse the information obtained by an eavesdropper during the various stages of a quantum cryptographic protocol associated with key distribution. We provide both an upper and a lower limit on the amount of information that may have leaked to the eavesdropper at the end of the key distribution procedure. These limits are restricted to intercept/resend eaves-dropping strategies. The upper one is higher than has been estimated so far, and should be taken into account in order to guarantee the secrecy of the final key, which is subsequently obtained via the so-called privacy amplification.
引用
收藏
页码:2455 / 2466
页数:12
相关论文
共 21 条
[1]   INFORMATION-THEORETIC LIMITS TO QUANTUM CRYPTOGRAPHY [J].
BARNETT, SM ;
PHOENIX, SJD .
PHYSICAL REVIEW A, 1993, 48 (01) :R5-R8
[2]   EAVESDROPPING STRATEGIES AND REJECTED-DATA PROTOCOLS IN QUANTUM CRYPTOGRAPHY [J].
BARNETT, SM ;
HUTTNER, B ;
PHOENIX, SJD .
JOURNAL OF MODERN OPTICS, 1993, 40 (12) :2501-2513
[3]  
Bennett C. H., 1992, Journal of Cryptology, V5, P3, DOI 10.1007/BF00191318
[4]   PRIVACY AMPLIFICATION BY PUBLIC DISCUSSION [J].
BENNETT, CH ;
BRASSARD, G ;
ROBERT, JM .
SIAM JOURNAL ON COMPUTING, 1988, 17 (02) :210-229
[5]   QUANTUM CRYPTOGRAPHY USING ANY 2 NONORTHOGONAL STATES [J].
BENNETT, CH .
PHYSICAL REVIEW LETTERS, 1992, 68 (21) :3121-3124
[6]   QUANTUM CRYPTOGRAPHY [J].
BENNETT, CH ;
BRASSARD, G ;
EKERT, AK .
SCIENTIFIC AMERICAN, 1992, 267 (04) :50-57
[7]   QUANTUM CRYPTOGRAPHY WITHOUT BELL THEOREM [J].
BENNETT, CH ;
BRASSARD, G ;
MERMIN, ND .
PHYSICAL REVIEW LETTERS, 1992, 68 (05) :557-559
[8]  
BENNETT CH, 1993, PREPRINT
[9]  
BENNETT CH, 1984, DEC IEEE INT C COMP, P175
[10]  
BENNETT CH, 1992, LECT NOTES COMPUT SC, V576, P351