首页> 外文会议>International Conference on Cryptology in India >Another Look at Symmetric Incoherent Optimal Eavesdropping against BB84
【24h】

Another Look at Symmetric Incoherent Optimal Eavesdropping against BB84

机译:另一个看对对称的非连贯最佳窃听对抗BB84

获取原文

摘要

The BB84 protocol is used by Alice (the sender) and Bob (the receiver) to settle on a secret classical bit-string by communicating qubits over an insecure quantum channel where Eve (the Eavesdropper) can have access. In this paper, we revisit a well known eavesdropping technique against BB84. We claim that there exist certain gaps in understanding the existing eavesdropping strategy in terms of cryptanalytic view and we try to bridge those gaps in this paper. First we refer to the result where it is shown that in the six-state variant of the BB84 protocol (Bru?, Phys. Rev. Lett., 1998), the mutual information between Alice (the sender) and Eve (the eavesdropper) is higher when two-bit probe is used compared to the one-bit probe and hence the two-bit probe provides a stronger eavesdropping strategy. However, from cryptanalytic point of view, we show that Eve has the same success probability in guessing the bit transmitted by Alice in both the cases of the two-bit and the one-bit probe. Thus, we point out that having higher mutual information may not directly lead to obtaining higher probability in guessing the key bit. It is also explained in the work of Bru? that the six-state variant of the BB84 protocol is more secure than the traditional four-state BB84. We look into this point in more detail and identify that this advantage is only achieved at the expense of communicating more qubits in the six-state protocol. In fact, we present different scenarios, where given the same number of qubits communicated, the security comparison of the four and six-state protocols is evaluated carefully.
机译:的BB84协议由通过不安全的量子信道其中前夕(窃听者)可以访问通信量子位使用由Alice(发送者)和鲍勃(接收器)来解决上的秘密经典位串。在本文中,我们重新审视对BB84一个众所周知的窃听技术。我们要求有理解在密码分析的观点认为现有的窃听策略存在一定的差距,我们试图弥合在本文中这些差距。首先,我们是指在那里示出的结果是,在BB84协议的六状态变体(BRU ?,物理评论快报,1998),爱丽丝(发送器)和前夕(窃听)之间的互信息较高时相比,一个位探针,因此两比特探头提供更强的窃听策略用于两比特探针。然而,从密码分析来看,我们证明了夏娃在猜测这两个位的两种情况下和一位探头由Alice传输的比特一样的成功概率。因此,我们指出,具有较高互信息可能并不直接导致猜测的键位获得更高的概率。它也是在布鲁的工作解释呢?该BB84协议的六状态变体是比传统的四状态BB84更安全。我们考虑这一点更详细,并确定这种优势在六州协议通信的更多的量子比特的代价才能实现。事实上,我们提出不同的方案,其中给出了相同数量的传递量子比特,四个和六国协议的安全性比较仔细评估。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号