Security of Bennett–Brassard 1984 Quantum-Key Distribution under a Collective-Rotation Noise Channel
نویسندگان
چکیده
The security analysis of the Ekert 1991 (E91), Bennett 1992 (B92), six-state protocol, Scarani–Acín–Ribordy–Gisin 2004 (SARG04) quantum key distribution (QKD) protocols, and their variants have been studied in presence collective-rotation noise channels. However, besides Bennett–Brassard 1984 (BB84) being first proposed, extensively studied, essential its proof under is still missing. Thus, we aim to close this gap literature. Consequently, investigate how channels affect BB84 protocol. Mainly, study scenarios where eavesdropper, Eve, conducts an intercept-resend attack on transmitted photons sent via a communication channel shared by Alice Bob. Notably, distinguish impact that eavesdropper. To achieve this, provide rigorous, yet straightforward numerical calculations. First, derive model for protocol parametrize mutual information between Eve. This followed deriving bit error rate (QBER) two scenarios. In particular, demonstrate that, small rotation angles, one can extract secure secret when there no eavesdropping. We observe induced 0.35 radians prepared state results QBER 11%, which corresponds lower bound tolerable QKD against general attacks. Moreover, rotational angle 0.53 yields 25% QBER, due attack. Finally, conclude robust attacks varied arbitrarily within particular bounds.
منابع مشابه
Robust polarization-based quantum key distribution over a collective-noise channel.
We present two polarization-based protocols for quantum key distribution. The protocols encode key bits in noiseless subspaces or subsystems and so can function over a quantum channel subjected to an arbitrary degree of collective noise, as occurs, for instance, due to rotation of polarizations in an optical fiber. These protocols can be implemented using only entangled photon-pair sources, sin...
متن کاملSecurity of Quantum Key Distribution
We construct a new quantum key distribution scheme and prove its security against the most general type of attacks and the most general type of noises allowed by quantum physics. The novel technique we use is reduction from a quantum scheme to a classical scheme. We first show that, rather surprisingly, the proof of security of our quantum key distribution in the error-free case can be reduced ...
متن کاملSecurity of quantum key distribution
Der sicheren Übertragung und Aufbewahrung vertraulicher Daten kommt in unserer von Information dominierten Gesellschaft immer grössere Bedeutung zu. Die heute gebräuchlichen Verfahren zur Datenverschlüsselung bieten allerdings nur berschränkte, so-genannt berechenmässige, Sicherheit. Das bedeutet, dass diese prinzipiell von einem Angreifer, der über genügend Rechenleistung (zum Beispiel einen, ...
متن کاملShor-Preskill-type security proof for concatenated Bennett-Brassard 1984 quantum-key-distribution protocol
Won-Young Hwang,* Keiji Matsumoto, Hiroshi Imai, Jaewan Kim, and Hai-Woong Lee IMAI Quantum Computation and Information Project, ERATO, Japan Science and Technology Corporation, Daini Hongo White Building 201, 5-28-3, Hongo, Bunkyo, Tokyo 133-0033, Japan School of Computational Sciences, Korea Institute for Advanced Study, Seoul 130-012, Korea Department of Physics, Korea Advanced Institute of ...
متن کاملSecurity Aspect of Quantum Key Distribution
Is the newly born quantum cryptography the ultimate solution for information security? A technique needs to be both theoretically strong and practically viable. But quantum cryptography comes to naught in the latter. Unlike many of the classical cryptosystems in use today, whose security often draws on unproven assumptions about the computational complexity of mathematical problems, the securit...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Photonics
سال: 2022
ISSN: ['2304-6732']
DOI: https://doi.org/10.3390/photonics9120941