Simple proof of the unconditional security of the Bennett 1992 quantum key distribution protocol

被引:50
|
作者
Zhang, Q [1 ]
Tang, CJ [1 ]
机构
[1] Natl Univ Deference Technol, Sch Elect Sci & Technol, Changsha 410073, Peoples R China
来源
PHYSICAL REVIEW A | 2002年 / 65卷 / 06期
关键词
D O I
10.1103/PhysRevA.65.062301
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
It is generally accepted that quantum key distribution (QKD) could supply legitimate users with unconditional security during their communication. Quite a lot of satisfactory efforts have been achieved on experimentations with quantum cryptography. However, when the eavesdropper has extra-powerful computational ability, has access to a quantum computer, for example, and can carry into execution any eavesdropping measurement that is allowed by the laws of physics, the security against such attacks has not been widely studied and rigorously proved for most QKD protocols. Quite recently, Shor and Preskill proved concisely the unconditional security of the Bennett-Brassard 1984 (BB84) protocol. Their method is highly valued for its clarity of concept and concision of form. In order to take advantage of the Shor-Preskill technique in their proof of the unconditional security of the BB84 QKD protocol, we introduced in this paper a transformation that can translate the Bennett 1992 (B92) protocol into the BB84 protocol. By proving that the transformation leaks no more information to the eavesdropper, we proved the unconditional security of the B92 protocol. We also settled the problem proposed by Lo about how to prove the unconditional security of the B92 protocol with the Shor-Preskill method.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] Security analysis of quantum key distribution protocol
    Omine T.
    Yamada C.
    Miyagi K.
    Ichikawa S.
    IEEJ Transactions on Industry Applications, 2016, 136 (10) : 698 - 702
  • [42] Security of "asymmetrical quantum key distribution protocol"
    Li, Chuan-Ming
    Hwang, Tzonelih
    Lee, Kuo-Chang
    INTERNATIONAL JOURNAL OF MODERN PHYSICS C, 2007, 18 (02): : 157 - 161
  • [43] The unconditional security of quantum key distribution - Alice, Bob, and Eve in quantumland
    Mor, T
    Roychowdhury, V
    QUANTUM COMMUNICATION, COMPUTING, AND MEASUREMENT 3, 2001, : 277 - 284
  • [44] Collective attacks and unconditional security in continuous variable quantum key distribution
    Grosshans, F
    PHYSICAL REVIEW LETTERS, 2005, 94 (02)
  • [45] Unconditional security of quantum key distribution over arbitrarily long distances
    Lo, HK
    Chau, HF
    SCIENCE, 1999, 283 (5410) : 2050 - 2056
  • [46] Quantum key distribution with unconditional security for all optical fiber network
    Hirota, O
    Kato, K
    Shoma, M
    Usuda, TS
    QUANTUM COMMUNICATIONS AND QUANTUM IMAGING, 2004, 5161 : 320 - 331
  • [47] Single-state semi-quantum key distribution protocol and its security proof
    Zhang, Wei
    Qiu, Daowen
    Mateus, Paulo
    INTERNATIONAL JOURNAL OF QUANTUM INFORMATION, 2020, 18 (04)
  • [48] Effects of preparation and measurement misalignments on the security of the Bennett-Brassard 1984 quantum-key-distribution protocol
    Woodhead, Erik
    Pironio, Stefano
    PHYSICAL REVIEW A, 2013, 87 (03):
  • [49] An enhanced quantum key distribution protocol for security authentication
    Kumar, Ankit
    Dadheech, Pankaj
    Singh, Vijander
    Raja, Linesh
    Poonia, Ramesh C.
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2019, 22 (04): : 499 - 507
  • [50] A proof of security of quantum key distribution in probabilistic clone scheme
    Zhao, SM
    Li, F
    Zheng, BY
    2003 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOL 1 AND 2, PROCEEDINGS, 2003, : 1507 - 1509