pith. sign in

arxiv: 0901.1932 · v1 · submitted 2009-01-14 · 🪐 quant-ph

Attack of Many Eavesdroppers via Optimal Strategy in Quantum Cryptography

classification 🪐 quant-ph
keywords eavesdroppersinformationeavesdropperoptimalattackderivederrorgain
0
0 comments X p. Extension
read the original abstract

We examine a situation that $n$ eavesdroppers attack the Bennett-Brassard cryptographic protocol via their own optimal and symmetric strategies. Information gain and mutual information with sender for each eavesdropper are explicitly derived. The receiver's error rate for the case of arbitrary $n$ eavesdroppers can be derived using a recursive relation. Although first eavesdropper can get mutual information without disturbance arising due to other eavesdroppers, subsequent eavesdropping generally increases the receiver's error rate. Other eavesdroppers cannot gain information on the input signal sufficiently. As a result, the information each eavesdropper gains becomes less than optimal one.

This paper has not been read by Pith yet.

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.