Access the full text.
Sign up today, get DeepDyve free for 14 days.
H. Brandt (1998)
Positive operator valued measure in quantum information processing, 3385
H. Brandt (2002)
Secrecy capacity in the four-state protocol of quantum key distributionJournal of Mathematical Physics, 43
C. Fuchs, A. Peres (1995)
Quantum-state disturbance versus information gain: Uncertainty relations for quantum information.Physical review. A, Atomic, molecular, and optical physics, 53 4
Charles Bennett, G. Brassard, C. Crépeau, U. Maurer (1994)
Generalized privacy amplificationProceedings of 1994 IEEE International Symposium on Information Theory
S. Wiesner (1983)
Conjugate codingSIGACT News, 15
Charles Bennett (1992)
Quantum cryptography using any two nonorthogonal states.Physical review letters, 68 21
H. Brandt (1999)
Eavesdropping optimization for quantum cryptography using a positive operator-valued measurePhysical Review A, 59
B. Slutsky, R. Rao, P. Sun, Y. Fainman (1998)
Security of quantum cryptography against individual attacks, 3228
A. Ekert (1991)
Quantum cryptography based on Bell's theorem.Physical review letters, 67 6
B. Slutsky, R. Rao, Pan-Cheng Sun, Ljubisa Tancevski, Shaya Fainman (1998)
Defense frontier analysis of quantum cryptographic systems.Applied optics, 37 14
For the four-state protocol of quantum key distribution, optimum sets of probe parameters are calculated for the most general unitary probe in which each individual transmitted photon is made to interact with the probe so that the signal and the probe are left in an entangled state, and projective measurement by the probe, made subsequent to projective measurement by the legitimate receiver, yields information about the signal state. The probe optimization is based on maximizing the Renyi information gain by the probe on corrected data for a given error rate induced by the probe in the legitimate receiver. An arbitrary angle is included between the nonorthogonal linear polarization states of the signal photons. Two sets of optimum probe parameters are determined which both correspond to the same optimization. Also, a larger set of optimum probe parameters is found than was known previously for the standard BB84 protocol. A detailed comparison is made between the complete and incomplete optimizations, and the latter simpler optimization is also made complete. Also, the process of key distillation from the quantum transmission in quantum key distribution is reviewed, with the objective of calculating the secrecy capacity of the four-state protocol in the presence of the eavesdropping probe. Emphasis is placed on information leakage to the probe.
Quantum Information Processing – Springer Journals
Published: Oct 18, 2004
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.