Paper 4, Section I, G
Describe the BB84 protocol for quantum key exchange.
Suppose we attempt to implement the BB84 protocol but cannot send single photons. Instead we send photons at a time all with the same polarization. An enemy can separate one of these photons from the other . Explain briefly how the enemy can intercept the key exchange without our knowledge.
Show that an enemy can find our common key if . Can she do so when (with suitable equipment)?
Typos? Please submit corrections to this page on GitHub.