arXiv Analytics

Sign in

arXiv:0901.1932 [quant-ph]AbstractReferencesReviewsResources

Attack of Many Eavesdroppers via Optimal Strategy in Quantum Cryptography

Eylee Jung, Mi-Ra Hwang, DaeKil Park, Hungsoo Kim, Eui-Soon Yim, Jin-Woo Son

Published 2009-01-14Version 1

We examine a situation that $n$ eavesdroppers attack the Bennett-Brassard cryptographic protocol via their own optimal and symmetric strategies. Information gain and mutual information with sender for each eavesdropper are explicitly derived. The receiver's error rate for the case of arbitrary $n$ eavesdroppers can be derived using a recursive relation. Although first eavesdropper can get mutual information without disturbance arising due to other eavesdroppers, subsequent eavesdropping generally increases the receiver's error rate. Other eavesdroppers cannot gain information on the input signal sufficiently. As a result, the information each eavesdropper gains becomes less than optimal one.

Comments: 17 pages, 8 figures
Journal: Phys. Rev. A79 (2009) 032339
Categories: quant-ph
Subjects: 03.67.Dd, 03.65.-w
Related articles: Most relevant | Search more
arXiv:quant-ph/0108133 (Published 2001-08-29)
On Classical and Quantum Cryptography
arXiv:1005.5064 [quant-ph] (Published 2010-05-27, updated 2010-08-27)
Correlation function and mutual information
arXiv:1209.0062 [quant-ph] (Published 2012-09-01, updated 2012-09-18)
Construct order parameter from the spectra of mutual information