Incoherent and coherent eavesdropping in the six-state protocol of quantumcryptography

Citation
H. Bechmann-pasquinucci et N. Gisin, Incoherent and coherent eavesdropping in the six-state protocol of quantumcryptography, PHYS REV A, 59(6), 1999, pp. 4238-4248
Citations number
24
Categorie Soggetti
Physics
Journal title
PHYSICAL REVIEW A
ISSN journal
10502947 → ACNP
Volume
59
Issue
6
Year of publication
1999
Pages
4238 - 4248
Database
ISI
SICI code
1050-2947(199906)59:6<4238:IACEIT>2.0.ZU;2-J
Abstract
All incoherent as well as 2- and 3-qubit coherent eavesdropping strategies on the six-state protocol of quantum cryptography are classified. For a dis turbance of 1/6, the optimal incoherent eavesdropping strategy reduces to t he universal quantum cloning machine. Coherent eavesdropping cannot increas e Eve's Shannon information, neither on the entire string of bits, nor on t he set of bits received undisturbed by Bob. However, coherent eavesdropping can increase as well Eve's Renyi information as her probability of guessin g correctly all bits. The case that Eve delays the measurement of her probe until after the public discussion on error correction and privacy amplific ation is also considered. It is argued that by doing so, Eve gains only neg ligibly small additional information. [S1050-2947(99)08706-5].