Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group
  • Conference on Lasers and Electro-Optics/Quantum Electronics and Laser Science Conference and Photonic Applications Systems Technologies
  • OSA Technical Digest (CD) (Optica Publishing Group, 2007),
  • paper QML6

Complete Physical Simulation of the Entangling-probe Attack on the BB84 Protocol

Not Accessible

Your library or personal account may give you access

Abstract

We have implemented the most powerful individual-photon attack against the Bennett-Brassard 1984 quantum key distribution protocol. Our measurement results are in good agreement with theoretical predictions for the eavesdropper’s Rényi information.

© 2007 Optical Society of America

PDF Article
More Like This
Attacking Quantum Key Distribution with Single-Photon Two-Qubit Quantum Logic

Jeffrey H. Shapiro and Franco N. C. Wong
QMA4 Quantum Electronics and Laser Science Conference (CLEO:FS) 2006

Optimal Individual Attacks against BB84

R. Garcia-Patron, F. N. C. Wong, and J. H. Shapiro
QWC6 International Conference on Quantum Information (QIM) 2008

Constraints on Eavesdropping on the BB84 Protocol

Gerald Gilbert and Michael Hamrick
PA1 International Conference on Quantum Information (QIM) 2001

Select as filters


Select Topics Cancel
© Copyright 2024 | Optica Publishing Group. All Rights Reserved