Randomness determines practical security of BB84 quantum key distribution

نویسندگان

  • Hong-Wei Li
  • Zhen-Qiang Yin
  • Shuang Wang
  • Yong-Jun Qian
  • Wei Chen
  • Guang-Can Guo
  • Zheng-Fu Han
چکیده

Unconditional security of the BB84 quantum key distribution protocol has been proved by exploiting the fundamental laws of quantum mechanics, but the practical quantum key distribution system maybe hacked by considering the imperfect state preparation and measurement respectively. Until now, different attacking schemes have been proposed by utilizing imperfect devices, but the general security analysis model against all of the practical attacking schemes has not been proposed. Here, we demonstrate that the general practical attacking schemes can be divided into the Trojan horse attack, strong randomness attack and weak randomness attack respectively. We prove security of BB84 protocol under randomness attacking models, and these results can be applied to guarantee the security of the practical quantum key distribution system.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security of practical phase-coding quantum key distribution

Security proof of practical quantum key distribution (QKD) has attracted a lot of attentions in recent years. Most of real-life QKD implementations are based on phase-coding BB84 protocol, which usually uses Unbalanced Mach-Zehnder Interferometer (UMZI) as the information coder and decoder. However, the long arm and short arm of UMZI will introduce different loss in practical experimental reali...

متن کامل

Evaluation of the phase randomness of the light source in quantum key distribution systems with an attenuated laser

Abstract The phase randomized light is one of the key assumptions in the security proof of BennettBrassard 1984 (BB84) quantum key distribution (QKD) protocol implemented with an attenuated laser. Though the assumption has been believed to be satisfied for conventional systems, it should be reexamined for current high speed QKD systems. The phase correlation may be induced by the overlap of the...

متن کامل

ar X iv : q ua nt - p h / 04 02 17 0 v 1 2 3 Fe b 20 04 Unconditional Security of Practical Quantum Key Distribution

We present an extension of the first proof for the unconditional security of the BB84 quantum key distribution protocol which was given by Mayers. We remove the constraint that a perfect BB84 quantum source is required and the proof given here covers a range of practical quantum sources. Nothing is assumed about the detector except that the efficiency with which signals are detected is basis in...

متن کامل

Improving efficiency of quantum key distribution with probabilistic measurements

The first part of this paper presents two efficient cryptographic protocols, based on quantum entanglement, for secure exchange of secret keys. While the first protocol requires storage of entangled qubits, the second protocol has no storage requirements and presents a probabilistic model. We show that there is a tradeoff between security against eavesdropping and the efficiency of the protocol...

متن کامل

Embedded security framework for integrated classical and quantum cryptography services in optical burst switching networks

Optical burst switching (OBS) is the most promising optical switching technology for the future Internet, but it suffers from security vulnerabilities. In this paper, we propose to embed a security framework which incorporates the strengths of classical and the emerging quantum cryptography techniques in the native OBS network architecture, providing a means to make the future Internet secure f...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره 5  شماره 

صفحات  -

تاریخ انتشار 2015