메뉴 건너뛰기




Volumn 71, Issue 4, 2005, Pages

Photon-number-splitting versus cloning attacks in practical implementations of the Bennett-Brassard 1984 protocol for quantum cryptography

Author keywords

[No Author keywords available]

Indexed keywords

BOB'S DETECTION EFFICIENCY; PHOTON-NUMBER-SPLITTING (PNS) ATTACK; SECURITY PARAMETERS; SUB-POISSONIAN SOURCES;

EID: 26944451694     PISSN: 10502947     EISSN: 10941622     Source Type: Journal    
DOI: 10.1103/PhysRevA.71.042316     Document Type: Article
Times cited : (45)

References (39)
  • 3
    • 0347111146 scopus 로고    scopus 로고
    • PLRAAN. 1050-2947. 10.1103/PhysRevA.61.052304
    • N. Lütkenhaus, Phys. Rev. A PLRAAN 1050-2947 10.1103/PhysRevA.61. 052304 61, 052304 (2000).
    • (2000) Phys. Rev. A , vol.61 , pp. 052304
    • Lütkenhaus, N.1
  • 4
    • 0003259517 scopus 로고
    • Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India (IEEE, New York
    • C. H. Bennett and G. Brassard, in Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India (IEEE, New York, 1984), pp. 175-179.
    • (1984) , pp. 175-179
    • Bennett, C.H.1    Brassard, G.2
  • 5
    • 2942623864 scopus 로고    scopus 로고
    • PLRAAN. 1050-2947. 10.1103/PhysRevA.69.042321
    • M. Curty and N. Lütkenhaus, Phys. Rev. A PLRAAN 1050-2947 10.1103/PhysRevA.69.042321 69, 042321 (2004).
    • (2004) Phys. Rev. A , vol.69 , pp. 042321
    • Curty, M.1    Lütkenhaus, N.2
  • 7
    • 4544222212 scopus 로고    scopus 로고
    • PLRAAN. 1050-2947. 10.1103/PhysRevA.69.012309
    • A. Acín, N. Gisin, and V. Scarani, Phys. Rev. A PLRAAN 1050-2947 10.1103/PhysRevA.69.012309 69, 012309 (2004).
    • (2004) Phys. Rev. A , vol.69 , pp. 012309
    • Acín, A.1    Gisin, N.2    Scarani, V.3
  • 8
    • 0041415963 scopus 로고    scopus 로고
    • PRLTAO 0031-9007 10.1103/PhysRevLett.91.057901
    • Recently, a number of new protocols have been invented using the notion of "decoy states," and which are secure against the PNS attacks: W.-Y. Hwang, Phys. Rev. Lett. PRLTAO 0031-9007 10.1103/PhysRevLett.91.057901 91, 057901 (2003);
    • (2003) Phys. Rev. Lett. , vol.91 , pp. 057901
    • Hwang, W.-Y.1
  • 10
    • 26944440040 scopus 로고    scopus 로고
    • quant-ph/0410075;
    • X.-B. Wang, quant-ph/0410075;
    • Wang, X.-B.1
  • 11
    • 26944502679 scopus 로고    scopus 로고
    • quant-ph/0411047.
    • quant-ph/0411047.
  • 14
    • 4544351377 scopus 로고    scopus 로고
    • NJOPFM. 1367-2630
    • R. Alléaume, New J. Phys. NJOPFM 1367-2630 6, 92 (2004).
    • (2004) New J. Phys. , vol.6 , pp. 92
    • Alléaume, R.1
  • 16
    • 8844247189 scopus 로고    scopus 로고
    • NJOPFM 1367-2630
    • S. Fasel, New J. Phys. NJOPFM 1367-2630 6, 163 (2004).
    • (2004) New J. Phys. , vol.6 , pp. 163
    • Fasel, S.1
  • 17
    • 26944503027 scopus 로고    scopus 로고
    • note
    • We consider only one-way communication protocols for error correction and privacy amplification. For two-way protocols ("advantage distillation") an avantageous coherent strategy has been found (D. Kaszlikowski, J. Y. Lim, L. C. Kwek, B.-G. Englert, quant-ph/0312172)
  • 18
    • 26944489936 scopus 로고    scopus 로고
    • note
    • but it has been proved recently that the same result can be achieved by individual attacks and measurements provided Eve waits until the end of the advantage distillation procedure (A. Acín, quant-ph/0411092).
  • 19
    • 7044249607 scopus 로고    scopus 로고
    • QICUAW. 1533-7146
    • For the most advanced lower bounds on BB84 with practical devices, see D. Gottesman, H.-K. Lo, N. Lütkenhaus, and J. Preskill, Quantum Inf. Comput. QICUAW 1533-7146 4, 325 (2004). Note, however, that their bounds cannot be compared directly to the ones described in this paper, since they suppose that Eve has full control over the imperfections of Bob's detectors.
    • (2004) Quantum Inf. Comput. , vol.4 , pp. 325
    • Gottesman, D.1    Lo, H.-K.2    Lütkenhaus, N.3    Preskill, J.4
  • 23
    • 0017973511 scopus 로고
    • IETTAW. 0018-9448. 10.1109/TIT.1978.1055892
    • I. Csiszár and J. Körner, IEEE Trans. Inf. Theory IETTAW 0018-9448 10.1109/TIT.1978.1055892 IT-24, 339 (1978).
    • (1978) IEEE Trans. Inf. Theory , vol.IT-24 , pp. 339
    • Csiszár, I.1    Körner, J.2
  • 25
    • 0000895875 scopus 로고    scopus 로고
    • PLRAAN 1050-2947 10.1103/PhysRevA.56.1173
    • R. B. Griffiths and C.-S. Niu, Phys. Rev. A PLRAAN 1050-2947 10.1103/PhysRevA.56.1173 56, 1173 (1997);
    • (1997) Phys. Rev. A , vol.56 , pp. 1173
    • Griffiths, R.B.1    Niu, C.-S.2
  • 30
    • 0038465444 scopus 로고    scopus 로고
    • PLRAAN 1050-2947 10.1103/PhysRevA.54.1844
    • V. Buek and M. Hillery, Phys. Rev. A PLRAAN 1050-2947 10.1103/PhysRevA.54.1844 54, 1844 (1996).
    • (1996) Phys. Rev. A , vol.54 , pp. 1844
    • Buek, V.1    Hillery, M.2
  • 31
    • 11544350211 scopus 로고    scopus 로고
    • PRLTAO. 0031-9007. 10.1103/PhysRevLett.81.3018
    • D. Bruß, Phys. Rev. Lett. PRLTAO 0031-9007 10.1103/PhysRevLett.81. 3018 81, 3018 (1998);
    • (1998) Phys. Rev. Lett. , vol.81 , pp. 3018
    • Bruß, D.1
  • 32
    • 0001293325 scopus 로고    scopus 로고
    • PLRAAN 1050-2947 10.1103/PhysRevA.59.4238
    • H. Bechmann-Pasquinucci and N. Gisin, Phys. Rev. A PLRAAN 1050-2947 10.1103/PhysRevA.59.4238 59, 4238 (1999).
    • (1999) Phys. Rev. A , vol.59 , pp. 4238
    • Bechmann-Pasquinucci, H.1    Gisin, N.2
  • 33
    • 4043140531 scopus 로고    scopus 로고
    • PLRAAN 1050-2947 10.1103/PhysRevA.67.042306
    • G. M. D'Ariano and C. Macchiavello, Phys. Rev. A PLRAAN 1050-2947 10.1103/PhysRevA.67.042306 67, 042306 (2003).
    • (2003) Phys. Rev. A , vol.67 , pp. 042306
    • D'Ariano, G.M.1    MacChiavello, C.2
  • 36
    • 26944444999 scopus 로고    scopus 로고
    • quant-ph/0406100.
    • X.-B. Wang, quant-ph/0406100.
    • Wang, X.-B.1
  • 39
    • 84861257342 scopus 로고    scopus 로고
    • We thank N. Lütkenhaus for bringing this point to our attention.
    • Lütkenhaus, N.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.