Paper
11 January 2005 Two-point attack on the two nonorthogonal states QKD protocol over a fiber optic channel
Author Affiliations +
Abstract
We suggest here a two-point eavesdropping strategy aimed at a two nonorthogonal states protocol of quantum key distribution over a fiber-optic channel. When the single-photon sources and detectors of Alice, Bob and the two Eve are all ideal, the two-point attack can break the two nonorthogonal states protocol if the distance between Alice and Bob is longer than 30 km. However, Bennett's original multi-photon protocol is secure against both two-point and beam splitting attacks, though the protocol is realized with a weak pulsed source.
© (2005) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Li Yang and Ling-An Wu "Two-point attack on the two nonorthogonal states QKD protocol over a fiber optic channel", Proc. SPIE 5631, Quantum Optics and Applications in Computing and Communications II, (11 January 2005); https://doi.org/10.1117/12.574313
Lens.org Logo
CITATIONS
Cited by 1 scholarly publication.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Quantum key distribution

Fiber optics

Telecommunications

Photons

Fiber optic communications

Information security

Sensors

RELATED CONTENT

Ageing of fiber optical devices
Proceedings of SPIE (February 07 2015)
Experimental E91 quantum key distribution
Proceedings of SPIE (February 19 2008)
The secrecy capacity of practical quantum cryptography
Proceedings of SPIE (August 04 2003)
Free-space quantum cryptography in daylight
Proceedings of SPIE (May 02 2000)

Back to Top