Abstract
Several methods for eavesdropping on the standard four coherent-state quantum cryptosystem together with a possible countermeasure are analysed and found to place a limit on the tolerable energy disadvantage of the users as compared to the eavesdropper. The possible significant role of the photon-number amplifier and the photon-number duplicator is indicated.
Original language | English (US) |
---|---|
Pages (from-to) | 939-949 |
Number of pages | 11 |
Journal | Journal of Optics B: Quantum and Semiclassical Optics |
Volume | 8 |
Issue number | 4 |
DOIs | |
State | Published - 1996 |
ASJC Scopus subject areas
- Atomic and Molecular Physics, and Optics
- Physics and Astronomy (miscellaneous)