Access the full text.
Sign up today, get DeepDyve free for 14 days.
H. Brandt (2003)
Topical Review: Optimum Probe Parameters for Entangling Probe in Quantum Key DistributionQuantum Information Processing, 2
H. Brandt (2002)
Probe optimization in four-state protocol of quantum cryptographyPhysical Review A, 66
H. Brandt (2001)
Inconclusive rate in quantum key distributionPhysical Review A, 64
H. Brandt (2003)
Optimization problem in quantum cryptographyJournal of Optics B-quantum and Semiclassical Optics, 5
H. Brandt (2000)
Inconclusive rate as a disturbance measure in quantum cryptographyPhysical Review A, 62
Charles Bennett (1992)
Quantum cryptography using any two nonorthogonal states.Physical review letters, 68 21
I. Wickelgren (1999)
The Man Who Would Spin Genes Into GoldScience, 285
H. Brandt (1998)
Positive operator valued measure in quantum information processing, 3385
H. Brandt, J. Myers (2005)
Quantum-cryptographic entangling probePhysical Review A, 71
H. Brandt (2002)
Secrecy capacity in the four-state protocol of quantum key distributionJournal of Mathematical Physics, 43
C. Fuchs, A. Peres (1995)
Quantum-state disturbance versus information gain: Uncertainty relations for quantum information.Physical review. A, Atomic, molecular, and optical physics, 53 4
B. Slutsky, R. Rao, P. Sun, Y. Fainman (1998)
Security of quantum cryptography against individual attacks, 3228
Gilles Brassard, Claude Crépeau (2005)
Quantum Cryptography
The quantum circuit and design are presented for an optimized entangling probe attacking the BB84 Protocol of quantum key distribution (QKD) and yielding maximum information to the probe. Probe photon polarization states become optimally entangled with the signal states on their way between the legitimate transmitter and receiver. Although standard von-Neumann projective measurements of the probe yield maximum information on the pre-privacy amplified key, if instead the probe measurements are performed with a certain positive operator valued measure (POVM), then the measurement results are unambiguous, at least some of the time. It follows that the BB84 (Bennett–Brassard 1984) protocol of quantum key distribution has a vulnerability similar to the well-known vulnerability of the B92 (Bennett 1992) protocol
Quantum Information Processing – Springer Journals
Published: Oct 8, 2005
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.