Back to Search Start Over

Experimental Eavesdropping Based on Optimal Quantum Cloning.

Authors :
Bartkiewicz, Karol
Lemr, Karel
Cernoch, AntonĂ­n
Soubusta, Jan
Miranowicz, Adam
Source :
Physical Review Letters. 4/26/2013, Vol. 110 Issue 17, p173601-1-173601-5. 5p.
Publication Year :
2013

Abstract

The security of quantum cryptography is guaranteed by the no-cloning theorem, which implies that an eavesdropper copying transmitted qubits in unknown states causes their disturbance. Nevertheless, in real cryptographic systems some level of disturbance has to be allowed to cover, e.g., transmission losses. An eavesdropper can attack such systems by replacing a noisy channel by a better one and by performing approximate cloning of transmitted qubits which disturb them but below the noise level assumed by legitimate users. We experimentally demonstrate such symmetric individual eavesdropping on the quantum key distribution protocols of Bennett and Brassard (BB84) and the trine-state spherical code of Renes (R04) with two-level probes prepared using a recently developed photonic multifunctional quantum cloner [Lemr et al., Phys. Rev. A 85 050307(R) (2012)]. We demonstrated that our optimal cloning device with high-success rate makes the eavesdropping possible by hiding it in usual transmission losses. We believe that this experiment can stimulate the quest for other operational applications of quantum cloning. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
00319007
Volume :
110
Issue :
17
Database :
Academic Search Index
Journal :
Physical Review Letters
Publication Type :
Academic Journal
Accession number :
87597756
Full Text :
https://doi.org/10.1103/PhysRevLett.110.173601