计算机科学
量子密钥分配
协议(科学)
量子
量子信息科学
量子网络
量子信道
量子信息
量子力学
量子态
计算机安全
安全通信
作者
J. I. Cirac,Nicolas Gisin
标识
DOI:10.1016/s0375-9601(97)00176-x
摘要
An elementary derivation of best eavesdropping strategies for the 4 state BB84 quantum cryptography protocol is presented, for both incoherent and two--qubit coherent attacks. While coherent attacks do not help Eve to obtain more information, they are more powerful to reveal the whole message sent by Alice. Our results are based on symmetric eavesdropping strategies, which we show to be sufficient to analyze these kind of problems.
科研通智能强力驱动
Strongly Powered by AbleSci AI