Application of the Simulation Attack on Entanglement Swapping Based QKD and QSS Protocols

Download Now
Provided by: IARIA
Topic: Security
Format: PDF
The authors discuss the security of quantum key distribution protocols based on entanglement swapping against collective attacks. Therefore, they apply a generic version of a collective attack strategy on the most general entanglement swapping scenario used for key distribution. Further, they focus on basis transformations, which are the most common operations performed by the legitimate parties to secure the communication. In this paper, they show that the angles, which describe these basis transformations can be optimized compared to an application of the Hadamard operation.
Download Now

Find By Topic