Complete physical simulation of the entangling-probe attack on the BB84 protocol

We have implemented the most powerful individual-photon attack against the Bennett-Brassard 1984 quantum key distribution protocol. Our measurement results are in good agreement with theoretical predictions for the eavesdropper?s Renyi information.

[1]  Taehyun Kim,et al.  Phase-stable source of polarization-entangled photons using a polarization Sagnac interferometer , 2006, 2006 Conference on Lasers and Electro-Optics and 2006 Quantum Electronics and Laser Science Conference.

[2]  Howard E. Brandt,et al.  Quantum-cryptographic entangling probe , 2005 .

[3]  Yeshaiahu Fainman,et al.  Security of quantum cryptography against individual attacks , 1998 .

[4]  Pérès,et al.  Quantum-state disturbance versus information gain: Uncertainty relations for quantum information. , 1995, Physical review. A, Atomic, molecular, and optical physics.

[5]  J.H. Shapiro,et al.  Attacking quantum key distribution with single-photon two-qubit quantum logic , 2006, 2006 Conference on Lasers and Electro-Optics and 2006 Quantum Electronics and Laser Science Conference.