2005
DOI: 10.1103/physreva.71.042312
|View full text |Cite
|
Sign up to set email alerts
|

Quantum-cryptographic entangling probe

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
68
0

Year Published

2005
2005
2023
2023

Publication Types

Select...
5
2

Relationship

2
5

Authors

Journals

citations
Cited by 36 publications
(69 citation statements)
references
References 11 publications
1
68
0
Order By: Relevance
“…Slutsky et al [8] demonstrated that the Fuchs-Peres constructwith the appropriate choice of probe state, interaction, and measurement-affords Eve the maximum amount of Rényi information about the error-free sifted bits that Bob receives for a given level of disturbance, i.e., for a given probability that a sifted bit will be received in er-ror. Brandt [5] extended the Slutsky et al treatment by showing that the optimal probe could be realized with a single CNOT gate. Figure 1 shows an abstract diagram of the resulting Fuchs-Peres-Brandt probe.…”
Section: The Fuchs-peres-brandt Probementioning
confidence: 99%
See 1 more Smart Citation
“…Slutsky et al [8] demonstrated that the Fuchs-Peres constructwith the appropriate choice of probe state, interaction, and measurement-affords Eve the maximum amount of Rényi information about the error-free sifted bits that Bob receives for a given level of disturbance, i.e., for a given probability that a sifted bit will be received in er-ror. Brandt [5] extended the Slutsky et al treatment by showing that the optimal probe could be realized with a single CNOT gate. Figure 1 shows an abstract diagram of the resulting Fuchs-Peres-Brandt probe.…”
Section: The Fuchs-peres-brandt Probementioning
confidence: 99%
“…Our attention, however, will be directed toward attacking BB84 QKD, as to our knowledge no such experiments have been performed, although a variety of potentially practical ap- * Electronic address: jhs@mit.edu proaches have been discussed [4]. Our particular objective will be to show that current technology permits physical simulation of the Fuchs-Peres-Brandt (FPB) probe [5], i.e., the most powerful individual attack on singlephoton BB84, and that developments underway in quantum nondemolition (QND) detection may soon turn this physical simulation into a full implementation of the attack. Thus we believe it is of interest to construct the physical simulation and put BB84's security to the test: how much information can Eve really derive about the key that Alice and Bob have distilled while keeping Alice and Bob oblivious to her presence.…”
Section: Introductionmentioning
confidence: 99%
“…(Note that E = 1/3 corresponds to complete information gain by the quantum cryptographic entangling probe.) Also the probe and measurement implementations remain the same (as in [1], [2], [3]) with the initial state of the probe now given by Eq. (6) or (21) below.…”
Section: Generalized Entangling Probementioning
confidence: 99%
“…To accomplish this, the following sign choices must be made for the probe parameter µ in Eqs. (26) and (27) of [1]:…”
Section: Generalized Entangling Probementioning
confidence: 99%
See 1 more Smart Citation