Publication | Open Access
Complete physical simulation of the entangling-probe attack on the Bennett-Brassard 1984 protocol
30
Citations
23
References
2007
Year
EngineeringBennett-brassard 1984Entangling-probe AttackHardware SecurityQuantum ComputingLepton-nucleon ScatteringQuantum EntanglementTrue AttackError CorrectionQuantum Key DistributionQuantum ScienceQuantum CryptographyQuantum SecurityPhysicsComplete Physical SimulationQuantum InformationNon-perturbative QcdPrivacy AmplificationCryptographyNatural SciencesParticle PhysicsQuantum CommunicationQuantum Error Correction
We have used deterministic single-photon two-qubit quantum logic to implement the most powerful individual-photon attack against the Bennett-Brassard 1984 (BB84) quantum key distribution protocol. Our measurement results, including physical source and gate errors, are in good agreement with theoretical predictions for the R\'enyi information obtained by Eve as a function of the errors she imparts to Alice and Bob's sifted key bits. The current experiment is a physical simulation of a true attack, because Eve has access to Bob's physical receiver module. Nevertheless, the physical simulation allows investigation of the fundamental security limit of the BB84 protocol against eavesdropping in the presence of realistic physical errors, and it affords the opportunity to study the effectiveness of error correction and privacy amplification when the BB84 protocol is attacked.
| Year | Citations | |
|---|---|---|
Page 1
Page 1