pith. sign in

arxiv: 0711.1728 · v1 · submitted 2007-11-12 · 🪐 quant-ph

On the optimality of individual entangling-probe attacks against BB84 quantum key distribution

classification 🪐 quant-ph
keywords attacksbb84errorindividualattackoptimaladaptedaddition
0
0 comments X p. Extension
read the original abstract

It is shown that an existing method to study ideal individual attacks on the BB84 QKD protocol using error discard can be adapted to reconciliation with error correction, and that an optimal attack can be explicitly found. Moreover, this attack fills Luetkenhaus bound, independently of whether error positions are leaked to Eve, proving that it is tight. In addition, we clarify why the existence of such optimal attacks is not in contradiction with the established ``old-style'' theory of BB84 individual attacks, as incorrectly suggested recently in a news feature.

This paper has not been read by Pith yet.

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.