A kind of attack strategy based on a probabilistic cloning machine is proposed in this letter. The security of BB84 and the six-state quantum key distribution protocols under this attack is studied by theoretic analys...A kind of attack strategy based on a probabilistic cloning machine is proposed in this letter. The security of BB84 and the six-state quantum key distribution protocols under this attack is studied by theoretic analyses and corroborated by simulations. It is concluded that the quantum key distribution protocols still have an asymptotic perfect security even if the eavesdropper adopts the proposed attack strategy.展开更多
Dear Editor,For virologists,it is crucial to confidently determine the concentration of infectious particles that are utilized and produced in experiments(Dulbecco,1952;Bushar and Sagripanti,1990;La Barre and Lowy,20...Dear Editor,For virologists,it is crucial to confidently determine the concentration of infectious particles that are utilized and produced in experiments(Dulbecco,1952;Bushar and Sagripanti,1990;La Barre and Lowy,2001;Gueret et al.,2002;Gao et al.,2009;Kutner et al.,2009;Grigorov et al.,2011.展开更多
文摘A kind of attack strategy based on a probabilistic cloning machine is proposed in this letter. The security of BB84 and the six-state quantum key distribution protocols under this attack is studied by theoretic analyses and corroborated by simulations. It is concluded that the quantum key distribution protocols still have an asymptotic perfect security even if the eavesdropper adopts the proposed attack strategy.
基金supported in part by NIH Research Grant R01NS081109 to SVHthe content is solely the responsibility of the authors and does not necessarily represent the official views of the NINDS/NIHappreciate the assistance of the editorial staff at UMES
文摘Dear Editor,For virologists,it is crucial to confidently determine the concentration of infectious particles that are utilized and produced in experiments(Dulbecco,1952;Bushar and Sagripanti,1990;La Barre and Lowy,2001;Gueret et al.,2002;Gao et al.,2009;Kutner et al.,2009;Grigorov et al.,2011.