Zhao Sheng-mei, Li Fei, Zheng Bao-yu. The Security of Quantum Key Distribution under Probabilistic Clone/ Resend Attack[J]. Journal of Electronics & Information Technology, 2005, 27(10): 1639-1642.
Citation:
Zhao Sheng-mei, Li Fei, Zheng Bao-yu. The Security of Quantum Key Distribution under Probabilistic
Clone/ Resend Attack[J]. Journal of Electronics & Information Technology, 2005, 27(10): 1639-1642.
Zhao Sheng-mei, Li Fei, Zheng Bao-yu. The Security of Quantum Key Distribution under Probabilistic Clone/ Resend Attack[J]. Journal of Electronics & Information Technology, 2005, 27(10): 1639-1642.
Citation:
Zhao Sheng-mei, Li Fei, Zheng Bao-yu. The Security of Quantum Key Distribution under Probabilistic
Clone/ Resend Attack[J]. Journal of Electronics & Information Technology, 2005, 27(10): 1639-1642.
In this paper, an attack scheme based on probabilistic cloning machine is proposed, where the eavesdropper measures the quantum state from sender with a probabilitstic cloning machine, and resends the receiver a new result. It is shown that there is still an asymptotic perfect security of quantum key distribution under this attack strategy. The simulation results on classical computer are consistent with the theoretic ones.