Quantum Key Distribution As a Scheme with Bernoulli Tests


如何引用文章

全文:

开放存取 开放存取
受限制的访问 ##reader.subscriptionAccessGranted##
受限制的访问 订阅存取

详细

A family of attacks on the BB84 protocol of quantum key distribution is explicitly constructed under which the lower bound of fundamental entropy uncertainty relations is attained in the asymptotic limit of long sequences. All attacks are parameterized by a single parameter Q, which has the meaning of error probability on the receiver side, is known to the eavesdropper, but is reliably unknown to legitimate users. The situation on the receiver side looks like a scheme with classical Bernoulli tests with unknown parameter Q. For the eavesdropper, the situation also looks like a Bernoulli scheme—tossing a coin with quantum states, where each message of the eavesdropper leads to a quantum state that is uniquely determined by the outcome of measurements on the receiver side. A statistical interpretation is given to the estimate of the error probability for Q and the key secrecy parameter εδ,n. It is shown that, for a given length n of a series of tests, the width δ of the confidence interval actually determines the accuracy of the estimate for the parameter Q and, accordingly, the key secrecy level—the value of the secrecy parameter \({\varepsilon _{\delta ,n}} = 2{e^{ - 2{\delta ^2}n}}\).

作者简介

S. Molotkov

Institute of Solid State Physics; Academy of Cryptography of the Russian Federation; Department of Computational Mathematics and Cybernetics

编辑信件的主要联系方式.
Email: Sergei.Molotkov@gmail.com
俄罗斯联邦, Chernogolovka, Moscow oblast, 142432; Moscow, 121552; Moscow, 119899

补充文件

附件文件
动作
1. JATS XML

版权所有 © Pleiades Publishing, Inc., 2018