1998
DOI: 10.1103/physrevlett.81.3018
|View full text |Cite
|
Sign up to set email alerts
|

Optimal Eavesdropping in Quantum Cryptography with Six States

Abstract: A generalization of the quantum cryptographic protocol by Bennett and Brassard is discussed, using three conjugate bases, i.e. six states. By calculating the optimal mutual information between sender and eavesdropper it is shown that this scheme is safer against eavesdropping on single qubits than the one based on two conjugate bases. We also address the question for a connection between the maximal classical correlation in a generalized Bell inequality and the intersection of mutual informations between sende… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

8
527
0
2

Year Published

2004
2004
2023
2023

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 741 publications
(537 citation statements)
references
References 13 publications
8
527
0
2
Order By: Relevance
“…Security may be improved by using three bases (Bruß, 1998;Bechmann-Pasquinucci and Gisin, 1999), and even more by going to higher dimensions (Bechmann-Pasquinucci and Peres, 2000;Bruß and Macchiavello 2002). Gisin, Ribordy, Tittel and Zbinden (2002) recently reviewed theoretical and experimental results in quantum cryptography.…”
Section: F the Essence Of Quantum Informationmentioning
confidence: 99%
“…Security may be improved by using three bases (Bruß, 1998;Bechmann-Pasquinucci and Gisin, 1999), and even more by going to higher dimensions (Bechmann-Pasquinucci and Peres, 2000;Bruß and Macchiavello 2002). Gisin, Ribordy, Tittel and Zbinden (2002) recently reviewed theoretical and experimental results in quantum cryptography.…”
Section: F the Essence Of Quantum Informationmentioning
confidence: 99%
“…When considering some specific protocols, there can be other, more efficient ways to obtain i.i.d. Specifically, for the BB84 [24] and the six-state protocol [25,26,27], suitable symmetries can be implemented in the protocol itself by random but coordinated bit-and phase flips [28,29]. Security bounds against general attacks can be computed by considering i.i.d.…”
Section: Security Analysis Against General Attacksmentioning
confidence: 99%
“…In this scheme, Alice prepares a qubit in one of the following six quantum states: {|0 , |1 , |± = 1/ √ 2(|0 ± |1 ), |± = 1/ √ 2(|0 ± i|1 ), and sends it to Bob [19]. On the receiving side, Bob measures each incoming signal by projecting it onto one of the three possible bases.…”
Section: Six-state Protocolmentioning
confidence: 99%
“…With this separability criterion, Refs. [4,13] analysed three well-known qubit-based QKD schemes, and provided a compact description of a minimal verification set of EWs (i.e, one that does not contain any redundant EW) for the four-state [18] and the six-state [19] QKD protocols, and a reduced verification set of EWs (i.e., one which may still include some redundant EWs) for the two-state [20] QKD scheme, respectively. These verification sets of EWs allow a systematic search for quantum correlations in p ij .…”
Section: Introductionmentioning
confidence: 99%