Modified BB84 quantum key distribution protocol robust to source imperfections

نویسندگان

چکیده

The Bennett-Brassard 1984 (BB84) protocol is the most widely implemented quantum key distribution (QKD) scheme. However, despite enormous theoretical and experimental efforts in past decades, security of this with imperfect sources has not yet been rigorously established. In paper, we address shortcoming prove BB84 presence multiple source imperfections, including state preparation flaws side channels, such as Trojan-horse attacks, mode dependencies classical correlations between emitted pulses. To do so, consider a modified that exploits basis mismatched events, which are often discarded standard analyses scheme; employ reference technique, powerful mathematical tool to accommodate imperfections analysis QKD. Moreover, compare achievable secret-key rate three-state loss-tolerant protocol, show addition fourth state, while redundant ideal conditions, significantly improves estimation leaked information resulting better performance. This paper demonstrates relevance guaranteeing implementation security, taking us step further towards closing existing gap theory practice

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Practical Quantum Key Distribution based on the BB84 protocol

Quantum Cryptography features a unique way of sharing a random sequence of bits between users with a certifiably security not attainable with either public or secret-key classical cryptographic systems. This is achieved by means of Quantum Key Distribution (QKD) techniques, which rely on exploiting the laws of quantum mechanics [1]. Indeed, only systems based on QKD techniques can offer uncondi...

متن کامل

Modified Novel Quantum Key Exchange using BB84 Algorithm

With the increasing number of eavesdroppers on communication channels, securing the reliability of digital communication has become a herculean task. For any communication and information exchange the most important step of securing the data is encryption and decryption (cryptography). The primary step involved in any efficient cryptographic system is Key Distribution. The paper deals with an e...

متن کامل

Constructing CSS Codes with LDPC Codes for the BB84 Quantum Key Distribution Protocol

Abstract—In this paper, we propose how to simply construct a pair of linear codes for the BB84 quantum key distribution protocol. This protocol allows unconditional security in the presence of an eavesdropper, and the pair of linear codes is used for error correction and privacy amplification. Since their high decoding performance implies low eavesdropper’s mutual information, good design of th...

متن کامل

Quantum Key Distribution via BB84 An Advanced Lab Experiment

Electronic communication has become one of the main pillars of modern society and their ongoing boom requires the development of new methods and techniques to secure data transmission. This has been the goal since the onset of cryptography in ancient times. Cryptography may be defined as the art of writing (encryption) and deciphering (decryption) messages in code in order to ensure their confi...

متن کامل

Simple proof of security of the BB84 quantum key distribution protocol

We prove that the 1984 protocol of Bennett and Brassard (BB84) for quantum key distribution is secure. We first give a key distribution protocol based on entanglement purification, which can be proven secure using methods from Lo and Chau's proof of security for a similar protocol. We then show that the security of this protocol implies the security of BB84. The entanglement purification based ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Physical review research

سال: 2023

ISSN: ['2643-1564']

DOI: https://doi.org/10.1103/physrevresearch.5.023065