Affiliation:
1. Computer Laboratory, University of Cambridge, 15 JJ Thomson Avenue, Cambridge CB3 0FD, UK
Abstract
Alice communicates with words drawn uniformly amongst {|j>}j=1…n, the canonical orthonormal basis. Sometimes however, Alice interleaves quantum decoys [Formula: see text] between her messages. Such pairwise superpositions of possible words cannot be distinguished from the message words. Thus as malevolent Eve observes the quantum channel, she runs the risk of damaging the superpositions (by causing a collapse). At the receiving end honest Bob, whom we assume is warned of the quantum decoys' distribution, checks upon their integrity with a measurement. The present work establishes, in the case of individual attacks, the tradeoff between Eve's information gain (her chances, if a message word was sent, of guessing which) and the disturbance she induces (Bob's chances, if a quantum decoy was sent, to detect tampering). Whilst not directly applicable to secure channel protocols, quantum decoys seem a powerful primitive for constructing other n-dimensional quantum cryptographic applications. Moreover, the methods employed in this article should be of strong interest to anyone concerned with the old but fundamental problem of how much information may be gained about a system, versus how much this will disturb the system, in quantum mechanics.
Publisher
World Scientific Pub Co Pte Lt
Subject
Physics and Astronomy (miscellaneous)
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献