Research Article
Efficiency of the Eavesdropping in B92 QKD Protocol with a QCM
@INPROCEEDINGS{10.1007/978-3-642-11731-2_33, author={Michael Siomau and Stephan Fritzsche}, title={Efficiency of the Eavesdropping in B92 QKD Protocol with a QCM}, proceedings={1st International ICST Workshop on Quantum and Classical Information Security}, proceedings_a={QCIS}, year={2012}, month={10}, keywords={B92 QKD protocol QCM mutual information discrepancy}, doi={10.1007/978-3-642-11731-2_33} }
- Michael Siomau
Stephan Fritzsche
Year: 2012
Efficiency of the Eavesdropping in B92 QKD Protocol with a QCM
QCIS
Springer
DOI: 10.1007/978-3-642-11731-2_33
Abstract
Success of any eavesdropping attack on a quantum cryptographic protocol can be reduced by the legitime users if they partially compare their data. It is important to know for the legitime users what is (necessary and enough) amount of data which should be compared to ensure that (possible) illegitime user has an arbitrary small information about the rest of data. To obtain such amount the legitime users need to know efficiencies of all possible attacks for particular cryptographic protocol. In this work we introduce the eavesdropping attack on Bennett’s B92 protocol for quantum key distribution (QKD) with a quantum cloning machine (QCM). We demonstrate efficiency of suggested attack and compare it with efficiencies of alternative attacks proposed before.