ChinaCom2009-Network and Information Security Symposium

Research Article

A new attack strategy for BB84 protocol based on Breidbart basis

  • @INPROCEEDINGS{10.1109/CHINACOM.2009.5339884,
        author={LIU Dan and PEI Chang-xing and QUAN Dong-xiao and HAN Bao-bin and ZHAO Nan},
        title={A new attack strategy for BB84 protocol based on Breidbart basis},
        proceedings={ChinaCom2009-Network and Information Security Symposium},
        publisher={IEEE},
        proceedings_a={CHINACOM2009-NIS},
        year={2009},
        month={11},
        keywords={Eavesdropping strategy; BB84 protocol; quantum cryptography; Breidbart basis},
        doi={10.1109/CHINACOM.2009.5339884}
    }
    
  • LIU Dan
    PEI Chang-xing
    QUAN Dong-xiao
    HAN Bao-bin
    ZHAO Nan
    Year: 2009
    A new attack strategy for BB84 protocol based on Breidbart basis
    CHINACOM2009-NIS
    IEEE
    DOI: 10.1109/CHINACOM.2009.5339884
LIU Dan1,*, PEI Chang-xing1,*, QUAN Dong-xiao1,*, HAN Bao-bin1,*, ZHAO Nan1,*
  • 1: State Key Lab. of Integrated Services Networks, Xidian Univ. Xi’an, 710071,China
*Contact email: secret_ren@sohu.com, chxpei@xidian.edu.cn, dxquan@xidian.edu.cn, hanbaobin@163.com, zhaonanonline@hotmail.com

Abstract

A new eavesdropping strategy for BB84 quantum key distribution protocol is proposed. This scheme is a new kind of intercept/resend strategy based on Breidbart basis. Under this scheme, eavesdropper can not only exactly obtain the exchanged information between legitimate users but also decrease the probability of being detected.