{"data":{"id":"10.48550/arxiv.quant-ph/9605007","type":"dois","attributes":{"doi":"10.48550/arxiv.quant-ph/9605007","prefix":"10.48550","suffix":"arxiv.quant-ph/9605007","identifiers":[{"identifier":"quant-ph/9605007","identifierType":"arXiv"}],"alternateIdentifiers":[{"alternateIdentifierType":"arXiv","alternateIdentifier":"quant-ph/9605007"}],"creators":[{"name":"Biham, E.","nameType":"Personal","givenName":"E.","familyName":"Biham","affiliation":[],"nameIdentifiers":[]},{"name":"Mor, T.","nameType":"Personal","givenName":"T.","familyName":"Mor","affiliation":[],"nameIdentifiers":[]}],"titles":[{"title":"On the Security of Quantum Cryptography Against Collective Attacks"}],"publisher":"arXiv","container":{},"publicationYear":1996,"subjects":[{"lang":"en","subject":"Quantum Physics (quant-ph)","subjectScheme":"arXiv"},{"subject":"FOS: Physical sciences","subjectScheme":"Fields of Science and Technology (FOS)"},{"subject":"FOS: Physical sciences","schemeUri":"http://www.oecd.org/science/inno/38235147.pdf","subjectScheme":"Fields of Science and Technology (FOS)"}],"contributors":[],"dates":[{"date":"1996-05-11T20:28:29Z","dateType":"Submitted","dateInformation":"v1"},{"date":"2009-12-01T00:21:12Z","dateType":"Updated","dateInformation":"v1"},{"date":"1997-01-06T15:24:40Z","dateType":"Submitted","dateInformation":"v2"},{"date":"2016-09-08T14:46:33Z","dateType":"Updated","dateInformation":"v2"},{"date":"1996-05","dateType":"Available","dateInformation":"v1"},{"date":"1996","dateType":"Issued"}],"language":null,"types":{"ris":"RPRT","bibtex":"article","citeproc":"article-journal","schemaOrg":"ScholarlyArticle","resourceType":"Article","resourceTypeGeneral":"Text"},"relatedIdentifiers":[{"relationType":"IsVersionOf","relatedIdentifier":"10.1103/physrevlett.78.2256","relatedIdentifierType":"DOI"}],"relatedItems":[],"sizes":[],"formats":[],"version":"2","rightsList":[{"rights":"Assumed arXiv.org perpetual, non-exclusive license to distribute this article for submissions made before January 2004","rightsUri":"http://arxiv.org/licenses/assumed-1991-2003/"}],"descriptions":[{"description":"We present strong attacks against quantum key distribution schemes which use quantum memories and quantum gates to attack directly the final key. We analyze a specific attack of this type, for which we find the density matrices available to the eavesdropper and the optimal information which can be extracted from them. We prove security against this attack and discuss security against any attack allowed by the rules of quantum mechanics.","descriptionType":"Abstract"},{"description":"10 pages, RevTeX. New version. To be published in Phys. Rev. Lett","descriptionType":"Other"}],"geoLocations":[],"fundingReferences":[],"xml":"PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0idXRmLTgiPz4KPHJlc291cmNlIHhtbG5zPSJodHRwOi8vZGF0YWNpdGUub3JnL3NjaGVtYS9rZXJuZWwtNCIgeG1sbnM6eHNpPSJodHRwOi8vd3d3LnczLm9yZy8yMDAxL1hNTFNjaGVtYS1pbnN0YW5jZSIgeHNpOnNjaGVtYUxvY2F0aW9uPSJodHRwOi8vZGF0YWNpdGUub3JnL3NjaGVtYS9rZXJuZWwtNCBodHRwOi8vc2NoZW1hLmRhdGFjaXRlLm9yZy9tZXRhL2tlcm5lbC00LjMvbWV0YWRhdGEueHNkIj4KICA8aWRlbnRpZmllciBpZGVudGlmaWVyVHlwZT0iRE9JIj4xMC40ODU1MC9BUlhJVi5RVUFOVC1QSC85NjA1MDA3PC9pZGVudGlmaWVyPgogIDxhbHRlcm5hdGVJZGVudGlmaWVycz4KICAgIDxhbHRlcm5hdGVJZGVudGlmaWVyIGFsdGVybmF0ZUlkZW50aWZpZXJUeXBlPSJhclhpdiI+cXVhbnQtcGgvOTYwNTAwNzwvYWx0ZXJuYXRlSWRlbnRpZmllcj4KICA8L2FsdGVybmF0ZUlkZW50aWZpZXJzPgogIDxjcmVhdG9ycz4KICAgIDxjcmVhdG9yPgogICAgICA8Y3JlYXRvck5hbWUgbmFtZVR5cGU9IlBlcnNvbmFsIj5CaWhhbSwgRS48L2NyZWF0b3JOYW1lPgogICAgICA8Z2l2ZW5OYW1lPkUuPC9naXZlbk5hbWU+CiAgICAgIDxmYW1pbHlOYW1lPkJpaGFtPC9mYW1pbHlOYW1lPgogICAgPC9jcmVhdG9yPgogICAgPGNyZWF0b3I+CiAgICAgIDxjcmVhdG9yTmFtZSBuYW1lVHlwZT0iUGVyc29uYWwiPk1vciwgVC48L2NyZWF0b3JOYW1lPgogICAgICA8Z2l2ZW5OYW1lPlQuPC9naXZlbk5hbWU+CiAgICAgIDxmYW1pbHlOYW1lPk1vcjwvZmFtaWx5TmFtZT4KICAgIDwvY3JlYXRvcj4KICA8L2NyZWF0b3JzPgogIDx0aXRsZXM+CiAgICA8dGl0bGU+T24gdGhlIFNlY3VyaXR5IG9mIFF1YW50dW0gQ3J5cHRvZ3JhcGh5IEFnYWluc3QgQ29sbGVjdGl2ZSBBdHRhY2tzPC90aXRsZT4KICA8L3RpdGxlcz4KICA8cHVibGlzaGVyPmFyWGl2PC9wdWJsaXNoZXI+CiAgPHB1YmxpY2F0aW9uWWVhcj4xOTk2PC9wdWJsaWNhdGlvblllYXI+CiAgPHN1YmplY3RzPgogICAgPHN1YmplY3QgeG1sOmxhbmc9ImVuIiBzdWJqZWN0U2NoZW1lPSJhclhpdiI+UXVhbnR1bSBQaHlzaWNzIChxdWFudC1waCk8L3N1YmplY3Q+CiAgICA8c3ViamVjdCBzdWJqZWN0U2NoZW1lPSJGaWVsZHMgb2YgU2NpZW5jZSBhbmQgVGVjaG5vbG9neSAoRk9TKSI+Rk9TOiBQaHlzaWNhbCBzY2llbmNlczwvc3ViamVjdD4KICA8L3N1YmplY3RzPgogIDxkYXRlcz4KICAgIDxkYXRlIGRhdGVUeXBlPSJTdWJtaXR0ZWQiIGRhdGVJbmZvcm1hdGlvbj0idjEiPjE5OTYtMDUtMTFUMjA6Mjg6MjlaPC9kYXRlPgogICAgPGRhdGUgZGF0ZVR5cGU9IlVwZGF0ZWQiIGRhdGVJbmZvcm1hdGlvbj0idjEiPjIwMDktMTItMDFUMDA6MjE6MTJaPC9kYXRlPgogICAgPGRhdGUgZGF0ZVR5cGU9IlN1Ym1pdHRlZCIgZGF0ZUluZm9ybWF0aW9uPSJ2MiI+MTk5Ny0wMS0wNlQxNToyNDo0MFo8L2RhdGU+CiAgICA8ZGF0ZSBkYXRlVHlwZT0iVXBkYXRlZCIgZGF0ZUluZm9ybWF0aW9uPSJ2MiI+MjAxNi0wOS0wOFQxNDo0NjozM1o8L2RhdGU+CiAgICA8ZGF0ZSBkYXRlVHlwZT0iQXZhaWxhYmxlIiBkYXRlSW5mb3JtYXRpb249InYxIj4xOTk2LTA1PC9kYXRlPgogIDwvZGF0ZXM+CiAgPHJlc291cmNlVHlwZSByZXNvdXJjZVR5cGVHZW5lcmFsPSJUZXh0Ij5BcnRpY2xlPC9yZXNvdXJjZVR5cGU+CiAgPHJlbGF0ZWRJZGVudGlmaWVycz4KICAgIDxyZWxhdGVkSWRlbnRpZmllciByZWxhdGVkSWRlbnRpZmllclR5cGU9IkRPSSIgcmVsYXRpb25UeXBlPSJJc1ZlcnNpb25PZiI+MTAuMTEwMy9QaHlzUmV2TGV0dC43OC4yMjU2PC9yZWxhdGVkSWRlbnRpZmllcj4KICA8L3JlbGF0ZWRJZGVudGlmaWVycz4KICA8dmVyc2lvbj4yPC92ZXJzaW9uPgogIDxyaWdodHNMaXN0PgogICAgPHJpZ2h0cyByaWdodHNVUkk9Imh0dHA6Ly9hcnhpdi5vcmcvbGljZW5zZXMvYXNzdW1lZC0xOTkxLTIwMDMvIj5Bc3N1bWVkIGFyWGl2Lm9yZyBwZXJwZXR1YWwsIG5vbi1leGNsdXNpdmUgbGljZW5zZSB0byBkaXN0cmlidXRlIHRoaXMgYXJ0aWNsZSBmb3Igc3VibWlzc2lvbnMgbWFkZSBiZWZvcmUgSmFudWFyeSAyMDA0PC9yaWdodHM+CiAgPC9yaWdodHNMaXN0PgogIDxkZXNjcmlwdGlvbnM+CiAgICA8ZGVzY3JpcHRpb24gZGVzY3JpcHRpb25UeXBlPSJBYnN0cmFjdCI+V2UgcHJlc2VudCBzdHJvbmcgYXR0YWNrcyBhZ2FpbnN0IHF1YW50dW0ga2V5IGRpc3RyaWJ1dGlvbiBzY2hlbWVzIHdoaWNoIHVzZSBxdWFudHVtIG1lbW9yaWVzIGFuZCBxdWFudHVtIGdhdGVzIHRvIGF0dGFjayBkaXJlY3RseSB0aGUgZmluYWwga2V5LiBXZSBhbmFseXplIGEgc3BlY2lmaWMgYXR0YWNrIG9mIHRoaXMgdHlwZSwgZm9yIHdoaWNoIHdlIGZpbmQgdGhlIGRlbnNpdHkgbWF0cmljZXMgYXZhaWxhYmxlIHRvIHRoZSBlYXZlc2Ryb3BwZXIgYW5kIHRoZSBvcHRpbWFsIGluZm9ybWF0aW9uIHdoaWNoIGNhbiBiZSBleHRyYWN0ZWQgZnJvbSB0aGVtLiBXZSBwcm92ZSBzZWN1cml0eSBhZ2FpbnN0IHRoaXMgYXR0YWNrIGFuZCBkaXNjdXNzIHNlY3VyaXR5IGFnYWluc3QgYW55IGF0dGFjayBhbGxvd2VkIGJ5IHRoZSBydWxlcyBvZiBxdWFudHVtIG1lY2hhbmljcy48L2Rlc2NyaXB0aW9uPgogICAgPGRlc2NyaXB0aW9uIGRlc2NyaXB0aW9uVHlwZT0iT3RoZXIiPjEwIHBhZ2VzLCBSZXZUZVguIE5ldyB2ZXJzaW9uLiBUbyBiZSBwdWJsaXNoZWQgaW4gUGh5cy4gUmV2LiBMZXR0PC9kZXNjcmlwdGlvbj4KICA8L2Rlc2NyaXB0aW9ucz4KPC9yZXNvdXJjZT4=","url":"https://arxiv.org/abs/quant-ph/9605007","contentUrl":null,"metadataVersion":0,"schemaVersion":"http://datacite.org/schema/kernel-4","source":"mds","isActive":true,"state":"findable","reason":null,"viewCount":0,"viewsOverTime":[],"downloadCount":0,"downloadsOverTime":[],"referenceCount":0,"citationCount":0,"citationsOverTime":[],"partCount":0,"partOfCount":0,"versionCount":0,"versionOfCount":0,"created":"2022-03-21T20:59:51.000Z","registered":"2022-03-21T20:59:51.000Z","published":"1996","updated":"2022-03-21T20:59:51.000Z"},"relationships":{"client":{"data":{"id":"arxiv.content","type":"clients"}},"provider":{"data":{"id":"arxiv","type":"providers"}},"media":{"data":{"id":"10.48550/arxiv.quant-ph/9605007","type":"media"}},"references":{"data":[]},"citations":{"data":[]},"parts":{"data":[]},"partOf":{"data":[]},"versions":{"data":[]},"versionOf":{"data":[]}}}}