Teleportation-based collective attacks in Gaussian quantum key distribution
In Gaussian quantum key distribution eavesdropping attacks are conventionally modeled through the universal entangling cloner scheme, which is based on the premise that the whole environment is under control of the adversary, i.e., the eavesdropper purifies the system.This assumption implies that the eavesdropper has either access to an identity (n