Advanced Search
Volume 27 Issue 10
Oct.  2005
Turn off MathJax
Article Contents
Zhao Sheng-mei, Li Fei, Zheng Bao-yu. The Security of Quantum Key Distribution under Probabilistic Clone/ Resend Attack[J]. Journal of Electronics & Information Technology, 2005, 27(10): 1639-1642.
Citation: Zhao Sheng-mei, Li Fei, Zheng Bao-yu. The Security of Quantum Key Distribution under Probabilistic Clone/ Resend Attack[J]. Journal of Electronics & Information Technology, 2005, 27(10): 1639-1642.

The Security of Quantum Key Distribution under Probabilistic Clone/ Resend Attack

  • Received Date: 2004-05-10
  • Rev Recd Date: 2004-09-03
  • Publish Date: 2005-10-19
  • In this paper, an attack scheme based on probabilistic cloning machine is proposed, where the eavesdropper measures the quantum state from sender with a probabilitstic cloning machine, and resends the receiver a new result. It is shown that there is still an asymptotic perfect security of quantum key distribution under this attack strategy. The simulation results on classical computer are consistent with the theoretic ones.
  • loading
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (2393) PDF downloads(1039) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return