Influence of Path Attacks on Security of Six-State Scheme

Article Preview

Abstract:

The safety of the six-state scheme in the practical communication systems was studied based on an effective eavesdropping method, which called path attacks adopted by eavesdroppers. In the practical systems, eavesdropper can select appropriate path to eavesdrop on legitimate users to obtain some information. This method will keep photon number distribution in the laser pulses, and the eavesdropper can be hidden by the losses of quantum channel without being detected. The results show that eavesdropper can get more information with the increase of transmission distance and the average number of photons.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

3114-3119

Citation:

Online since:

December 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] H.K. Lo and H.F. Chau: Science. Vol. 283 (1992), p. (2050)

Google Scholar

[2] M.S. F: Chinese Journal of Quantum Electronics. Vol. 25 (2008), p.572, In Chinese

Google Scholar

[3] D. Bru: Phys.Rev.Lett. Vol. 81 (1998), p.3018

Google Scholar

[4] M Williamson, et al: Journal of Modern Optics. Vol. 50(2003), p. (2009)

Google Scholar

[5] S. Felix, N. Gisin,et al: J Mod Optics. Vol. 48 (2001), p.(2009)

Google Scholar

[6] G. Brassard, et al: Phys.Rev.Lett. Vol. 85 (2000), p.330

Google Scholar

[7] J.F. Liu, R.S. Liang, Z.L. Tang, et al: Journal of Photon. Vol. 33 (2004), p.1356, In Chinese

Google Scholar

[8] A.K. Ekert, et al: Phys.Rev.A. Vol. 50(1994), p.1047

Google Scholar

[9] I. Csiszar, et al: IEEE Trans.Info.Theory. Vol. 24(1978), p.339

Google Scholar