Another Look at Symmetric Incoherent Optimal Eavesdropping against BB84
نویسندگان
چکیده
The BB84 protocol is used by Alice (the sender) and Bob (the receiver) to settle on a secret classical bit-string by communicating qubits over an insecure quantum channel where Eve (the Eavesdropper) can have access. In this paper, we revisit a well known eavesdropping technique against BB84. We claim that there exist certain gaps in understanding the existing eavesdropping strategy in terms of cryptanalytic view and we try to bridge those gaps in this paper. First we refer to the result where it is shown that in the six-state variant of the BB84 protocol (Bruß, Phys. Rev. Lett., 1998), the mutual information between Alice (the sender) and Eve (the eavesdropper) is higher when two-bit probe is used compared to the one-bit probe and hence the two-bit probe provides a stronger eavesdropping strategy. However, from cryptanalytic point of view, we show that Eve has the same success probability in guessing the bit transmitted by Alice in both the cases of the two-bit and the one-bit probe. Thus, we point out that having higher mutual information may not directly lead to obtaining higher probability in guessing the key bit. It is also explained in the work of Bruß that the six-state variant of the BB84 protocol is more secure than the traditional four-state BB84. We look into this point in more detail and identify that this advantage is only achieved at the expense of communicating more qubits in the sixstate protocol. In fact, we present different scenarios, where given the same number of qubits communicated, the security comparison of the four and six-state protocols is evaluated carefully.
منابع مشابه
Symmetric Incoherent Eavesdropping against MDI QKD
In this paper, we concentrate on the very recently proposed Measurement Device Independent Quantum Key Distribution (MDI QKD) protocol by Lo, Curty and Qi (PRL, 2012). In this protocol, a secret key is established between Alice and Bob with the help of an untrusted third-party called Eve. We study how one can suitably mount a symmetric incoherent eavesdropping strategy on MDI QKD considering th...
متن کاملRevisiting Symmetric Incoherent Optimal Eavesdropping in BB84 Protocol
The famous BB84 protocol relies on the conjugate bases Z = {|0〉, |1〉} and X = {|+〉, |−〉}, where |+〉 = |0〉+|1〉 √ 2 and |−〉 = |0〉−|1〉 √ 2 . Fuchs et. al. (Phy. Rev. A, 1997) presented an optimal eavesdropping strategy on the four-state BB84 protocol. Later Bruß (Phys. Rev. Lett., 1998) described the use of the basis { |0〉+i|1〉 √ 2 , |0〉−i|1〉 √ 2 } along with the above two to show that the BB84 pr...
متن کاملAttacks of BB84 protocol in quantum cryptography
An optimal eavesdropping strategy for BB84 protocol in quantum cryptography is proposed. This scheme is based on the ‘indirect copying’. Under this scheme, eavesdropper can exactly obtain the exchanged information between the legitimate users without being detected.
متن کاملOptimal Eavesdropping in Quantum Cryptography: Choice of Interaction Is Unique up to a Rotation of the Underlying Basis
A general framework of optimal eavesdropping on BB84 protocol was provided by Fuchs et al. in 1997. An upper bound on mutual information was derived in their work, which could be achieved by a specific type of interaction and the corresponding measurement. However, uniqueness of an optimal interaction was left as an open problem there. We resolve this problem here and establish the uniqueness. ...
متن کاملRevisiting Optimal Eavesdropping in Quantum Cryptography: Choice of Interaction Is Unique up to Rotation of the Underlying Basis
A general framework of optimal eavesdropping on BB84 protocol was provided by Fuchs et al. [Phys. Rev. A, 1997]. An upper bound on mutual information was derived, which could be achieved by a specific type of interaction and the corresponding measurement. However, uniqueness of optimal interaction was posed as an unsolved problem there and it has remained open for almost two decades now. In thi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012