Abstract
A quantum scheme for an optimal attack on protocol BB84, the most studied protocol of quantum cryptography, is constructed. The physical implementation of this scheme on the basis of linear fiber-optical elements and the two-particle “controlled NOT” quantum transformation is proposed.
Similar content being viewed by others
References
Bennett, C.H. and Brassard, G., in Proc.of IEEE Int. Conf. Comput. Sys. and Sign. Proc. Bangalore, India, Dec., 1984, p. 175.
Molotkov, S.N. and Timofeev, A.V., Pis’ma Zh. Éksp. Teor. Fiz., 2007, vol. 85, p. 632 [JETP Lett. (Engl. Transl.), 2007, vol. 85, p. 524].
Kholevo, A.S., Vvedenie v kvantovuyu teoriyu informatsii (Introduction to Quantum Theory of Information), Ser. Sovrem. Mat. Fiz., No. 5, Moscow: MTsNMO, 2002.
Nielsen, M. and Chuang, I., Quantum Computation and Quantum Information, Cambridge: Univ., 2001; Moscow: Mir, 2006.
Pittman, T.B., Jacobs, B.C., and Franson, J.D., Phys. Rev. A, 2001, vol. 64, p. 062311.
Ralph, T.C., Langford, N.K., Bell, T.B., and White, A.G., Phys. Rev. A, 2002, vol. 65, p. 062324.
Hofmann, H.F. and Takeuchi, S., Phys. Rev. A, 2002, vol. 66, p. 024308.
O’Brien, J.L., Pryde, G.J., White, A.G., et al., Nature, 2003, vol. 426, p. 264.
Rebi, S., Vitali, D., Ottaviani, C., et al., Phys. Rev. A, 2004, vol. 70, p. 032317.
Glancy, S., LoSecco, J.M., and Tanner, C.E., arXiv:quant-ph/0009110.
Hiroshi, A., Wang, Y., and Lu, J.Sh., Superlatt. Microstruct., 2003, vol. 34, p. 213.
Ottaviani, C., Rebi, S., Vitali, D., and Tombesi, P., Quantum Phase Gate Operation Based on Nonlinear Optics: Full Quantum Analysis, Preprint QMJ5, 2006
Amitabh Joshi and Min Xiao, Phys. Rev. A, 2005, vol. 72, p. 062319.
Leung, P.M., Ralph, T.C., Munro, W.J., and Nemoto, K., arXiv:quant-ph/0810.2828.
Amitabh Joshi and Min Xiao, Phase Gates With Four-Level Inverted-Y System, Preprint JWB100, 2005.
Author information
Authors and Affiliations
Corresponding author
Additional information
Original Russian Text © D.A. Kronberg, S.N. Molotkov, 2010, published in Izvestiya Rossiiskoi Akademii Nauk. Seriya Fizicheskaya, 2010, Vol. 74, No. 7, pp. 954–960.
About this article
Cite this article
Kronberg, D.A., Molotkov, S.N. Quantum scheme for an optimal attack on quantum key distribution protocol BB84. Bull. Russ. Acad. Sci. Phys. 74, 912–918 (2010). https://doi.org/10.3103/S1062873810070051
Published:
Issue Date:
DOI: https://doi.org/10.3103/S1062873810070051