Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group

Optimal Individual Attacks against BB84

Not Accessible

Your library or personal account may give you access

Abstract

An economical version of asymmetric phase-covariant cloning is shown to provide an optimal individual attack on the BB84 protocol with error correction that can be physically simulated using deterministic single-photon two-qubit quantum logic.

© 2008 Optical Society of America

PDF Article
More Like This
Complete Physical Simulation of the Entangling-probe Attack on the BB84 Protocol

Taehyun Kim, Ingo Stork genannt Wersborg, Franco N. C. Wong, and Jeffrey H. Shapiro
QML6 Quantum Electronics and Laser Science Conference (CLEO:FS) 2007

Attacking Quantum Key Distribution with Single-Photon Two-Qubit Quantum Logic

Jeffrey H. Shapiro and Franco N. C. Wong
QMA4 Quantum Electronics and Laser Science Conference (CLEO:FS) 2006

BB84 and DQPS-QKD experiments using one polarization-insensitive measurement setup with a countermeasure against detector blinding and control attacks

Muataz Alhussein, Kyo Inoue, and Toshimori Honjo
JTu2A.28 CLEO: Applications and Technology (CLEO:A&T) 2019

Select as filters


Select Topics Cancel
© Copyright 2024 | Optica Publishing Group. All rights reserved, including rights for text and data mining and training of artificial technologies or similar technologies.