Abstract

We present strong attacks against quantum key distribution schemes which use\nquantum memories and quantum gates to attack directly the final key. We analyze\na specific attack of this type, for which we find the density matrices\navailable to the eavesdropper and the optimal information which can be\nextracted from them. We prove security against this attack and discuss security\nagainst any attack allowed by the rules of quantum mechanics.\n

Keywords

Quantum key distributionQuantum cryptographyComputer securityComputer scienceKey (lock)CryptographyQuantumTheoretical computer scienceQuantum informationQuantum mechanicsPhysics

Affiliated Institutions

Related Publications

Quantum cryptography based on Bell’s theorem

Practical application of the generalized Bell's theorem in the so-called key distribution process in cryptography is reported. The proposed scheme is based on the Bohm's version...

1991 Physical Review Letters 10250 citations

Quantum computational networks

The theory of quantum computational networks is the quantum generalization of the theory of logic circuits used in classical computing machines. Quantum gates are the generaliza...

1989 Proceedings of the Royal Society of L... 1253 citations

OceanStore

OceanStore is a utility infrastructure designed to span the globe and provide continuous access to persistent information. Since this infrastructure is comprised of untrusted se...

2000 ACM SIGPLAN Notices 2019 citations

Publication Info

Year
1997
Type
article
Volume
78
Issue
11
Pages
2256-2259
Citations
126
Access
Closed

External Links

Social Impact

Social media, news, blog, policy document mentions

Citation Metrics

126
OpenAlex

Cite This

Eli Biham, Tal Mor (1997). Security of Quantum Cryptography against Collective Attacks. Physical Review Letters , 78 (11) , 2256-2259. https://doi.org/10.1103/physrevlett.78.2256

Identifiers

DOI
10.1103/physrevlett.78.2256