Share Email Print

Proceedings Paper

Security of quantum cryptography against individual attacks
Author(s): Boris A. Slutsky; Ramesh R. Rao; Pang Chen Sun; Yeshaiahu Fainman
Format Member Price Non-Member Price
PDF $17.00 $21.00

Paper Abstract

An attempt to eavesdrop a quantum cryptographic channel reveals itself through errors it inevitably introduces into the transmission. We investigate the relationship between the induced error rate and the maximum amount of information the eavesdropper can extract, both in the two-state B92 and the four-state BB84 quantum cryptographic protocols. In each case, the optimal eavesdropping method that on average yields the most information for a given error rate is explicitly constructed. Analysis is limited to eavesdropping strategies where each bit of the quantum transmission is attacked individually and independently form other bits. Subject to this restriction, however, we believe that all attacks not forbidden by physical laws are included. Unlike previous work, the eavesdropper's advantage is measured in terms of Renyi information, and with respect only to bits received error-free by Bob. This alters both the maximum extractable information and the optimal eavesdropping attack. The result can be used directly at the privacy amplification stage of the protocol to accomplish secure communication over a noisy channel.

Paper Details

Date Published: 1 February 1998
PDF: 12 pages
Proc. SPIE 3228, Multimedia Networks: Security, Displays, Terminals, and Gateways, (1 February 1998); doi: 10.1117/12.300902
Show Author Affiliations
Boris A. Slutsky, Univ. of California/San Diego (United States)
Ramesh R. Rao, Univ. of California/San Diego (United States)
Pang Chen Sun, Univ. of California/San Diego (United States)
Yeshaiahu Fainman, Univ. of California/San Diego (United States)

Published in SPIE Proceedings Vol. 3228:
Multimedia Networks: Security, Displays, Terminals, and Gateways
Louis S. Lome; V. Michael Bove Jr.; Barbara Derryberry; Clifford R. Holliday; Louis S. Lome; Vishal Markandey; Andrew G. Tescher; Bhaskaran Vasudev, Editor(s)

© SPIE. Terms of Use
Back to Top
Sign in to read the full article
Create a free SPIE account to get access to
premium articles and original research
Forgot your username?