How does the mutual information between Alice and Bob and Alice and Eve vary for different quantum key distribution protocols?
Sunday, 27 August 2023
by EITCA Academy
The mutual information between Alice and Bob, and Alice and Eve, can vary for different quantum key distribution (QKD) protocols. In the field of cybersecurity, specifically in quantum cryptography fundamentals, the security of QKD against eavesdropping strategies is a important aspect to consider. To understand the variation in mutual information, let's first define what mutual
- Published in Cybersecurity, EITC/IS/QCF Quantum Cryptography Fundamentals, Security of Quantum Key Distribution, Eavesdropping strategies, Examination review
Tagged under:
B92, BB84, Cybersecurity, E91, Eavesdropping, Mutual Information, Quantum Key Distribution

