Acta Photonica Sinica, Volume. 33, Issue 11, 1356(2004)
Eavesdropping of Practical QKD System Based on BB84 Protocol
[1] [1] Bennett C, Brassard G. Quantum cryptography: Public-key distribution and coin tossing.In proceedings of the IEEE International Conference on Computers,Systems and Signal Processing, Bangalore,India, New York:IEEE , 1984 .175~179
[2] [2] Bennett C.Quantum cryptography using any two nonorthogonal states.Phys Rev Lett,1992,68(21):3121~3124
[3] [3] Ekert A.Quantum cryptography based on Bell's theorem. Phys Rev Lett,1991,67(6):661~663
[4] [4] Ekert A, Huttner B, Peres A,et al. Eavesddropping on quantum-cryptographical systems.Phys Rev(A),1994,50(2):1047~1056
[5] [5] Lütkenhaus N.Security against eavesdropping in quantum cryptography. Phys Rev(A), 1996,54(1):97~111
[6] [6] Fuchs A, Gisin N, Peres A,et al.Optimal eavesdropping in quantum cryptography. I. Information bound and optimal strategy.Phys Rev(A),1997,56(2):1163~1172
[7] [7] Félix s, Gisin N,Stefanov A,et al.Faint laser quantum key distribution:eavesdropping exploiting multiphoton pulses.J Mod Optics,2001,48(13):2009~2021
[10] [10] Bennett C, Brassard G,Smolin J,et al. Experimental quantum cryptography.J Crypto,1992,5(1):3~28
Get Citation
Copy Citation Text
[in Chinese], [in Chinese], [in Chinese], [in Chinese], [in Chinese], [in Chinese], [in Chinese]. Eavesdropping of Practical QKD System Based on BB84 Protocol[J]. Acta Photonica Sinica, 2004, 33(11): 1356