Abstract

All incoherent as well as 2- and 3-qubit coherent eavesdropping strategies on the 6 state protocol of quantum cryptography are classified. For a disturbance of 1/6, the optimal incoherent eavesdropping strategy reduces to the universal quantum cloning machine. Coherent eavesdropping cannot increase Eve's Shannon information, neither on the entire string of bits, nor on the set of bits received undisturbed by Bob. However, coherent eavesdropping can increase as well Eve's Renyi information as her probability of guessing correctly all bits. The case that Eve delays the measurement of her probe until after the public discussion on error correction and privacy amplification is also considered. It is argued that by doing so, Eve gains only a negligibly small additional information.

Keywords

EavesdroppingQuantum cryptographyComputer scienceQubitProtocol (science)Coherent statesCryptographyQuantum cloningSet (abstract data type)State (computer science)Quantum key distributionQuantum informationTheoretical computer scienceQuantumMathematicsAlgorithmPhysicsQuantum mechanicsComputer securityQuantum error correction

Affiliated Institutions

Related Publications

Quantum cryptography based on Bell’s theorem

Practical application of the generalized Bell's theorem in the so-called key distribution process in cryptography is reported. The proposed scheme is based on the Bohm's version...

1991 Physical Review Letters 10250 citations

Publication Info

Year
1999
Type
article
Volume
59
Issue
6
Pages
4238-4248
Citations
350
Access
Closed

External Links

Social Impact

Social media, news, blog, policy document mentions

Citation Metrics

350
OpenAlex

Cite This

H. Bechmann-Pasquinucci, Nicolas Gisin (1999). Incoherent and coherent eavesdropping in the six-state protocol of quantum cryptography. Physical Review A , 59 (6) , 4238-4248. https://doi.org/10.1103/physreva.59.4238

Identifiers

DOI
10.1103/physreva.59.4238