Randomness determines practical security of BB84 quantum key distribution
نویسندگان
چکیده
Unconditional security of the BB84 quantum key distribution protocol has been proved by exploiting the fundamental laws of quantum mechanics, but the practical quantum key distribution system maybe hacked by considering the imperfect state preparation and measurement respectively. Until now, different attacking schemes have been proposed by utilizing imperfect devices, but the general security analysis model against all of the practical attacking schemes has not been proposed. Here, we demonstrate that the general practical attacking schemes can be divided into the Trojan horse attack, strong randomness attack and weak randomness attack respectively. We prove security of BB84 protocol under randomness attacking models, and these results can be applied to guarantee the security of the practical quantum key distribution system.
منابع مشابه
Security of practical phase-coding quantum key distribution
Security proof of practical quantum key distribution (QKD) has attracted a lot of attentions in recent years. Most of real-life QKD implementations are based on phase-coding BB84 protocol, which usually uses Unbalanced Mach-Zehnder Interferometer (UMZI) as the information coder and decoder. However, the long arm and short arm of UMZI will introduce different loss in practical experimental reali...
متن کاملEvaluation of the phase randomness of the light source in quantum key distribution systems with an attenuated laser
Abstract The phase randomized light is one of the key assumptions in the security proof of BennettBrassard 1984 (BB84) quantum key distribution (QKD) protocol implemented with an attenuated laser. Though the assumption has been believed to be satisfied for conventional systems, it should be reexamined for current high speed QKD systems. The phase correlation may be induced by the overlap of the...
متن کاملar X iv : q ua nt - p h / 04 02 17 0 v 1 2 3 Fe b 20 04 Unconditional Security of Practical Quantum Key Distribution
We present an extension of the first proof for the unconditional security of the BB84 quantum key distribution protocol which was given by Mayers. We remove the constraint that a perfect BB84 quantum source is required and the proof given here covers a range of practical quantum sources. Nothing is assumed about the detector except that the efficiency with which signals are detected is basis in...
متن کاملImproving efficiency of quantum key distribution with probabilistic measurements
The first part of this paper presents two efficient cryptographic protocols, based on quantum entanglement, for secure exchange of secret keys. While the first protocol requires storage of entangled qubits, the second protocol has no storage requirements and presents a probabilistic model. We show that there is a tradeoff between security against eavesdropping and the efficiency of the protocol...
متن کاملEmbedded security framework for integrated classical and quantum cryptography services in optical burst switching networks
Optical burst switching (OBS) is the most promising optical switching technology for the future Internet, but it suffers from security vulnerabilities. In this paper, we propose to embed a security framework which incorporates the strengths of classical and the emerging quantum cryptography techniques in the native OBS network architecture, providing a means to make the future Internet secure f...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره 5 شماره
صفحات -
تاریخ انتشار 2015