optimal strategy in quantum cryptography



Attack of many eavesdroppers via optimal strategy in quantum cryptography

FREE-DOWNLOADE Jung, MR Hwang, DK Park, H Kim, ES Yim… – Physical Review A,
We examine a situation that n eavesdroppers attack the Bennett-Brassard cryptographic protocol
via their own optimal and symmetric strategies. Information gain and mutual information with
sender for each eavesdropper are explicitly derived. The receiver’s error rate for the case