optimal strategy in quantum cryptography


COMPUTER COURSE ONLINE

Attack of many eavesdroppers via optimal strategy in quantum cryptography

FREE-DOWNLOADE Jung, MR Hwang, DK Park, H Kim, ES Yim… – Physical Review A,
We examine a situation that n eavesdroppers attack the Bennett-Brassard cryptographic protocol
via their own optimal and symmetric strategies. Information gain and mutual information with
sender for each eavesdropper are explicitly derived. The receiver’s error rate for the case 




IEEE PAPER UNITED STATES