An economical version of asymmetric phase-covariant cloning is shown to provide an optimal individual attack on the BB84 protocol with error correction that can be physically simulated using deterministic single-photon two-qubit quantum logic.

© 2008 Optical Society of America

PDF Article
More Like This
Complete Physical Simulation of the Entangling-probe Attack on the BB84 Protocol

Taehyun Kim, Ingo Stork genannt Wersborg, Franco N. C. Wong, and Jeffrey H. Shapiro
QML6 Quantum Electronics and Laser Science Conference (QELS) 2007

Attacking Quantum Key Distribution with Single-Photon Two-Qubit Quantum Logic

Jeffrey H. Shapiro and Franco N. C. Wong
QMA4 Quantum Electronics and Laser Science Conference (QELS) 2006

BB84 and DQPS-QKD experiments using one polarization-insensitive measurement setup with a countermeasure against detector blinding and control attacks

Muataz Alhussein, Kyo Inoue, and Toshimori Honjo
JTu2A.28 CLEO: Applications and Technology (CLEO_AT) 2019


You do not have subscription access to this journal. Citation lists with outbound citation links are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
Login to access Optica Member Subscription