On the secrecy of a simple and effective implementation of BB84 quantum cryptography protocol

被引:10
|
作者
Molotkov, S. N. [1 ,2 ,3 ,4 ]
机构
[1] Russian Acad Sci, Inst Solid State Phys, Chernogolovka 142432, Moscow Region, Russia
[2] Acad Cryptog Russian Federat, Moscow 121552, Russia
[3] Moscow MV Lomonosov State Univ, Fac Computat Math & Cybernet, Moscow 119991, Russia
[4] Moscow MV Lomonosov State Univ, Quantum Technol Ctr, Moscow 119991, Russia
关键词
security; quantum key distribution; entropic uncertainty relations;
D O I
10.1088/1612-202X/ab189b
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
A simple and effective fiber implementation of the BB84 protocol is proposed, which does not use phase modulators at the receiving side and do not require adjustment of the polarization state at the output of the communication channel. The implementation of the protocol permits to prove of the secrecy of keys based on the fundamental entropic uncertainty relations. The secret key length is expressed only in terms of the values observed on the reception side, with various detector parameters, such as quantum efficiency and the probability of dark counts, are taken into account automatically for the secret key length, but implicitly in terms of the observed parameters.
引用
下载
收藏
页数:10
相关论文
共 50 条
  • [1] Secrecy capacity in the BB84 protocol of quantum cryptography
    Brandt, HE
    QUANTUM COMMUNICATION, MEASUREMENT AND COMPUTING, PROCEEDINGS, 2003, : 383 - 386
  • [2] A Playful Sketch of the Quantum Cryptography Protocol BB84
    Calderbank, Robert
    IEEE BITS the Information Theory Magazine, 2022, 2 (03):
  • [3] A Simple Method of Protection against a Detector Mismatch Attack in Quantum Cryptography: The BB84 Protocol
    Balygin, K. A.
    Bobrov, I. B.
    Klimov, A. N.
    Molotkov, S. N.
    Ryzhkin, M. I.
    JOURNAL OF EXPERIMENTAL AND THEORETICAL PHYSICS, 2020, 130 (02) : 161 - 169
  • [4] Security of Entanglement Based Version of BB84 protocol for Quantum Cryptography
    Sharma, Anand
    Ojha, Vibha
    Lenka, S. K.
    PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 9 (ICCSIT 2010), 2010, : 615 - 619
  • [5] A Simple Method of Protection against a Detector Mismatch Attack in Quantum Cryptography: The BB84 Protocol
    K. A. Balygin
    I. B. Bobrov
    A. N. Klimov
    S. N. Molotkov
    M. I. Ryzhkin
    Journal of Experimental and Theoretical Physics, 2020, 130 : 161 - 169
  • [6] Cryptographic robustness of practical quantum cryptography: BB84 key distribution protocol
    Molotkov, S. N.
    JOURNAL OF EXPERIMENTAL AND THEORETICAL PHYSICS, 2008, 107 (01) : 28 - 48
  • [7] Cryptographic robustness of practical quantum cryptography: BB84 key distribution protocol
    S. N. Molotkov
    Journal of Experimental and Theoretical Physics, 2008, 107 : 28 - 48
  • [8] Simple proof of security of the BB84 quantum key distribution protocol
    Shor, PW
    Preskill, J
    PHYSICAL REVIEW LETTERS, 2000, 85 (02) : 441 - 444
  • [9] The FPGA Implementation of Quantum Key Distribution Based on BB84 protocol
    Li, Huifang
    Zhang, Minghui
    Wang, Kaibin
    PROCEEDINGS OF THE 2016 2ND WORKSHOP ON ADVANCED RESEARCH AND TECHNOLOGY IN INDUSTRY APPLICATIONS, 2016, 81 : 1571 - 1574
  • [10] A Novel Basis Splitting Eavesdropping Scheme in Quantum Cryptography Based on the BB84 Protocol
    赵楠
    朱畅华
    权东晓
    Chinese Physics Letters, 2015, (08) : 26 - 30