TY - GEN
T1 - Limits on detecting eavesdropper in QKD protocols
AU - Subramaniam, Pranav
AU - Parakh, Abhishek
N1 - Publisher Copyright:
© 2014 IEEE.
PY - 2014
Y1 - 2014
N2 - Quantum key distribution (QKD) protocols form a natural choice for encryption in optical networks. All the QKD protocols use errors caused due to random measurements by Eve to detect her presence. In this paper, we present a fundamental limitation of using such bases to detect an eavesdropper in two QKD protocols - the BB84 and the new quantum Diffie-Hellman key exchange protocol. It is shown that the eavesdropper will go undetected in each exchange in both the protocols at least half the time.
AB - Quantum key distribution (QKD) protocols form a natural choice for encryption in optical networks. All the QKD protocols use errors caused due to random measurements by Eve to detect her presence. In this paper, we present a fundamental limitation of using such bases to detect an eavesdropper in two QKD protocols - the BB84 and the new quantum Diffie-Hellman key exchange protocol. It is shown that the eavesdropper will go undetected in each exchange in both the protocols at least half the time.
KW - limits on eavesdropper detection
KW - quantum Diffie-Hellman protocol
KW - quantum cryptography
UR - http://www.scopus.com/inward/record.url?scp=84988289860&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84988289860&partnerID=8YFLogxK
U2 - 10.1109/ANTS.2014.7057239
DO - 10.1109/ANTS.2014.7057239
M3 - Conference contribution
AN - SCOPUS:84988289860
T3 - 2014 IEEE International Conference on Advanced Networks and Telecommunication Systems, ANTS 2014
BT - 2014 IEEE International Conference on Advanced Networks and Telecommunication Systems, ANTS 2014
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2014 IEEE International Conference on Advanced Networks and Telecommunication Systems, ANTS 2014
Y2 - 14 December 2014 through 17 December 2014
ER -