2003
DOI: 10.1103/physreva.67.032310
|View full text |Cite
|
Sign up to set email alerts
|

Security of the Bennett 1992 quantum-key distribution protocol against individual attack over a realistic channel

Abstract: The security of two-state quantum key distribution against individual attack is estimated when the channel has losses and noises. We assume that Alice and Bob use two nonorthogonal single-photon polarization states. To make our analysis simple, we propose a modified B92 protocol in which Alice and Bob make use of inconclusive results and Bob performs a kind of symmetrization of received states. Using this protocol, Alice and Bob can estimate Eve's information gain as a function of a few parameters which reflec… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
14
0

Year Published

2004
2004
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(14 citation statements)
references
References 21 publications
0
14
0
Order By: Relevance
“…In our case we have considered the worst case scenario where Eve performs two types of attacks on the channel simultaneously: the unambiguous state discrimination (USD) attack [22] and the photon number splitting (PNS) attack [23,24]. It is known that the B92 protocol is vulnerable to the USD with a lossless channel attack, whereby Eve can gain 100% of the key if the loss of the channel is ≥71% [25]. If the loss of the transmission channel is lower, Alice and Bob can distill a secret key, albeit at the cost of discarding the information gained by Eve through privacy amplification.…”
Section: Resultsmentioning
confidence: 99%
“…In our case we have considered the worst case scenario where Eve performs two types of attacks on the channel simultaneously: the unambiguous state discrimination (USD) attack [22] and the photon number splitting (PNS) attack [23,24]. It is known that the B92 protocol is vulnerable to the USD with a lossless channel attack, whereby Eve can gain 100% of the key if the loss of the channel is ≥71% [25]. If the loss of the transmission channel is lower, Alice and Bob can distill a secret key, albeit at the cost of discarding the information gained by Eve through privacy amplification.…”
Section: Resultsmentioning
confidence: 99%
“…The security of BB84 against individual attacks has been investigated in several works [11,12,13]. The security of the B92 protocol against individual attacks has also been proven [14]. The restriction to individual attacks is often considered a realistic assumption because the capability to perform joint attacks is well beyond the domain of modern technology.…”
Section: Introductionmentioning
confidence: 99%
“…The estimation of G for continuous schemes, if possible, is important as a comparison with discrete schemes. At least, the framework [14,15] can be adapted to hybrid schemes.For these discrete schemes, the experimental imperfections are mostly determined by observed bit error rate and dark count rate of single photon detectors [11,12,13]. In continuous-variable schemes, the experimental imperfections appear as the change of quadrature distributions.…”
mentioning
confidence: 99%
“…For these discrete schemes, the experimental imperfections are mostly determined by observed bit error rate and dark count rate of single photon detectors [11,12,13]. In continuous-variable schemes, the experimental imperfections appear as the change of quadrature distributions.…”
mentioning
confidence: 99%
See 1 more Smart Citation