Skip to main content
Erschienen in: Quantum Information Processing 6/2020

01.06.2020

Simple analysis of security of the BB84 quantum key distribution protocol

verfasst von: Hong-Yi Su

Erschienen in: Quantum Information Processing | Ausgabe 6/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

A simple proof of security of the BB84 protocol is presented in this paper. The proof is achieved in an information-theoretic way without referring to the formalism of quantum error-correction codes. Two examples are presented and discussed, showing that some previous results are special cases of the framework in this paper. It is suggested that the proof here sheds new light on security analysis of quantum key distribution, and that its technique may also improve the studies of other quantum information tasks.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Nielsen, M.A., Chuang, I.L.: Quantum Computation and Quantum Information. Cambridge University Press, Cambridge (2000)MATH Nielsen, M.A., Chuang, I.L.: Quantum Computation and Quantum Information. Cambridge University Press, Cambridge (2000)MATH
2.
3.
Zurück zum Zitat Merkle, R.: Secure communications over insecure channels. Commun. ACM 21, 294–299 (1978)CrossRef Merkle, R.: Secure communications over insecure channels. Commun. ACM 21, 294–299 (1978)CrossRef
4.
Zurück zum Zitat Rivest, R.L., Shamir, A., Adleman, L.M.: A method of obtaining digital signatures and public-key cryptosystems. Commun. ACM 21, 120–126 (1978)MathSciNetCrossRef Rivest, R.L., Shamir, A., Adleman, L.M.: A method of obtaining digital signatures and public-key cryptosystems. Commun. ACM 21, 120–126 (1978)MathSciNetCrossRef
5.
Zurück zum Zitat Scarani, V., Bechmann-Pasquinucci, H., Cerf, N.J., Dušek, M., Lütkenhaus, N., Peev, M.: The security of practical quantum key distribution. Rev. Mod. Phys. 81, 1301 (2009)ADSCrossRef Scarani, V., Bechmann-Pasquinucci, H., Cerf, N.J., Dušek, M., Lütkenhaus, N., Peev, M.: The security of practical quantum key distribution. Rev. Mod. Phys. 81, 1301 (2009)ADSCrossRef
6.
Zurück zum Zitat Gisin, N., Ribordy, G., Tittel, W., Zbinden, H.: Quantum cryptography. Rev. Mod. Phys. 74, 145 (2002)ADSCrossRef Gisin, N., Ribordy, G., Tittel, W., Zbinden, H.: Quantum cryptography. Rev. Mod. Phys. 74, 145 (2002)ADSCrossRef
7.
Zurück zum Zitat Vernam, G.S.: Cipher printing telegraph systems for secret wire and radio telegraphic communications. J. Am. Inst. Electr. Eng. 45, 109–115 (1926) Vernam, G.S.: Cipher printing telegraph systems for secret wire and radio telegraphic communications. J. Am. Inst. Electr. Eng. 45, 109–115 (1926)
8.
Zurück zum Zitat Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, 1984, pp. 175–179. IEEE, New York (1984) Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, 1984, pp. 175–179. IEEE, New York (1984)
9.
Zurück zum Zitat Lo, H.-K., Curty, M., Qi, B.: Measurement-device-independent quantum key distribution. Phys. Rev. Lett. 108, 130503 (2012)ADSCrossRef Lo, H.-K., Curty, M., Qi, B.: Measurement-device-independent quantum key distribution. Phys. Rev. Lett. 108, 130503 (2012)ADSCrossRef
10.
Zurück zum Zitat Yin, Z.-Q., Fung, C.-H.F., Ma, X., Zhang, C.-M., Li, H.-W., Chen, W., Wang, S., Guo, G.-C., Han, Z.-F.: Measurement-device-independent quantum key distribution with uncharacterized qubit sources. Phys. Rev. A 88, 062322 (2013)ADSCrossRef Yin, Z.-Q., Fung, C.-H.F., Ma, X., Zhang, C.-M., Li, H.-W., Chen, W., Wang, S., Guo, G.-C., Han, Z.-F.: Measurement-device-independent quantum key distribution with uncharacterized qubit sources. Phys. Rev. A 88, 062322 (2013)ADSCrossRef
11.
Zurück zum Zitat Yin, Z.-Q., Fung, C.-H.F., Ma, X., Zhang, C.-M., Li, H.-W., Chen, W., Wang, S., Guo, G.-C., Han, Z.-F.: Mismatched-basis statistics enable quantum key distribution with uncharacterized qubit sources. Phys. Rev. A 90, 052319 (2014)ADSCrossRef Yin, Z.-Q., Fung, C.-H.F., Ma, X., Zhang, C.-M., Li, H.-W., Chen, W., Wang, S., Guo, G.-C., Han, Z.-F.: Mismatched-basis statistics enable quantum key distribution with uncharacterized qubit sources. Phys. Rev. A 90, 052319 (2014)ADSCrossRef
12.
Zurück zum Zitat Bennett, C.H., Brassard, G., Mermin, N.D.: Quantum cryptography without Bell’s theorem. Phys. Rev. Lett. 68, 557 (1992)ADSMathSciNetCrossRef Bennett, C.H., Brassard, G., Mermin, N.D.: Quantum cryptography without Bell’s theorem. Phys. Rev. Lett. 68, 557 (1992)ADSMathSciNetCrossRef
13.
Zurück zum Zitat Calderbank, A.R., Shor, P.W.: Good quantum error-correcting codes exist. Phys. Rev. A 54, 1098–1105 (1996)ADSCrossRef Calderbank, A.R., Shor, P.W.: Good quantum error-correcting codes exist. Phys. Rev. A 54, 1098–1105 (1996)ADSCrossRef
14.
15.
Zurück zum Zitat Lo, H.-K., Chau, H.F.: Unconditional security of quantum key distribution over arbitrarily long distances. Science 283, 2050–2056 (1999)ADSCrossRef Lo, H.-K., Chau, H.F.: Unconditional security of quantum key distribution over arbitrarily long distances. Science 283, 2050–2056 (1999)ADSCrossRef
16.
Zurück zum Zitat Shor, P.W., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85, 441 (2000)ADSCrossRef Shor, P.W., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85, 441 (2000)ADSCrossRef
17.
Zurück zum Zitat Bennett, C.H., DiVincenzo, D.P., Smolin, J.A., Wootters, W.K.: Mixed-state entanglement and quantum error correction. Phys. Rev. A 54, 3824–3851 (1996)ADSMathSciNetCrossRef Bennett, C.H., DiVincenzo, D.P., Smolin, J.A., Wootters, W.K.: Mixed-state entanglement and quantum error correction. Phys. Rev. A 54, 3824–3851 (1996)ADSMathSciNetCrossRef
18.
Zurück zum Zitat Yuen, H.P.: Security of quantum key distribution. IEEE Access 4, 724–749 (2016)CrossRef Yuen, H.P.: Security of quantum key distribution. IEEE Access 4, 724–749 (2016)CrossRef
20.
Zurück zum Zitat Biham, E., Boyer, M., Boykin, P.O., Mor, T., Roychowdhury, V.: A proof of the security of quantum key distribution (extended abstract). In: Proceedings of the Thirty-Second Annual ACM Symposium on Theory of Computing, pp. 715–724. ACM Press, New York (2000) Biham, E., Boyer, M., Boykin, P.O., Mor, T., Roychowdhury, V.: A proof of the security of quantum key distribution (extended abstract). In: Proceedings of the Thirty-Second Annual ACM Symposium on Theory of Computing, pp. 715–724. ACM Press, New York (2000)
21.
Zurück zum Zitat Bruß, D.: Optimal eavesdropping in quantum cryptography with six states. Phys. Rev. Lett. 81, 3018 (1998)ADSCrossRef Bruß, D.: Optimal eavesdropping in quantum cryptography with six states. Phys. Rev. Lett. 81, 3018 (1998)ADSCrossRef
22.
Zurück zum Zitat Bechmann-Pasquinucci, H., Gisin, N.: Incoherent and coherent eavesdropping in the six-state protocol of quantum cryptography. Phys. Rev. A 59, 4238 (1999)ADSMathSciNetCrossRef Bechmann-Pasquinucci, H., Gisin, N.: Incoherent and coherent eavesdropping in the six-state protocol of quantum cryptography. Phys. Rev. A 59, 4238 (1999)ADSMathSciNetCrossRef
23.
Zurück zum Zitat Horodecki, R., Horodecki, M.: Information-theoretic aspects of inseparability of mixed states. Phys. Rev. A 54, 1838 (1996)ADSMathSciNetCrossRef Horodecki, R., Horodecki, M.: Information-theoretic aspects of inseparability of mixed states. Phys. Rev. A 54, 1838 (1996)ADSMathSciNetCrossRef
24.
Zurück zum Zitat Holevo, A.S.: Some estimates for the amount of information transmittable by a quantum communications channel. Probl. Peredachi Inf. 9, 3–11 (1973)MathSciNet Holevo, A.S.: Some estimates for the amount of information transmittable by a quantum communications channel. Probl. Peredachi Inf. 9, 3–11 (1973)MathSciNet
25.
Zurück zum Zitat Devetak, I., Winter, A.: Distillation of secret key and entanglement from quantum states. Proc. R. Soc. A 461, 207–235 (2005)ADSMathSciNetCrossRef Devetak, I., Winter, A.: Distillation of secret key and entanglement from quantum states. Proc. R. Soc. A 461, 207–235 (2005)ADSMathSciNetCrossRef
26.
Zurück zum Zitat Robert, J.-M.: Detection et Correction d’Erreurs en Cryptographie, Master thesis, Université de Montréal, (1985) Robert, J.-M.: Detection et Correction d’Erreurs en Cryptographie, Master thesis, Université de Montréal, (1985)
27.
Zurück zum Zitat Brassard, G., Salvail, L.: Secret-key reconciliation by public discussion. In: Advances in Cryptology—EUROCRYPT ’93, pp. 410–423. Springer, Berlin (1994) Brassard, G., Salvail, L.: Secret-key reconciliation by public discussion. In: Advances in Cryptology—EUROCRYPT ’93, pp. 410–423. Springer, Berlin (1994)
28.
Zurück zum Zitat Wegman, M.N., Carter, J.L.: New hash functions and their use in authentication and set equality. J. Comput. Syst. Sci. 22, 265–279 (1981)MathSciNetCrossRef Wegman, M.N., Carter, J.L.: New hash functions and their use in authentication and set equality. J. Comput. Syst. Sci. 22, 265–279 (1981)MathSciNetCrossRef
29.
Zurück zum Zitat Bennett, C.H., Brassard, G., Robert, J.-M.: Privacy amplification by public discussion. SIAM J. Comput. 17, 210–229 (1988)MathSciNetCrossRef Bennett, C.H., Brassard, G., Robert, J.-M.: Privacy amplification by public discussion. SIAM J. Comput. 17, 210–229 (1988)MathSciNetCrossRef
30.
Zurück zum Zitat Caves, C.M., Fuchs, C.A., Schack, R.: Unknown quantum states: the quantum de Finetti representation. J. Math. Phys. 43, 4537 (2002)ADSMathSciNetCrossRef Caves, C.M., Fuchs, C.A., Schack, R.: Unknown quantum states: the quantum de Finetti representation. J. Math. Phys. 43, 4537 (2002)ADSMathSciNetCrossRef
31.
Zurück zum Zitat Christandl, M., König, R., Renner, R.: Postselection technique for quantum channels with applications to quantum cryptography. Phys. Rev. Lett. 102, 020504 (2009)ADSCrossRef Christandl, M., König, R., Renner, R.: Postselection technique for quantum channels with applications to quantum cryptography. Phys. Rev. Lett. 102, 020504 (2009)ADSCrossRef
32.
Zurück zum Zitat Gottesman, D., Lo, H.-K., Lütkenhaus, N., Preskill, J.: Security of quantum key distribution with imperfect devices. Quantum Inf. Comput. 5, 325–360 (2004)MathSciNetMATH Gottesman, D., Lo, H.-K., Lütkenhaus, N., Preskill, J.: Security of quantum key distribution with imperfect devices. Quantum Inf. Comput. 5, 325–360 (2004)MathSciNetMATH
Metadaten
Titel
Simple analysis of security of the BB84 quantum key distribution protocol
verfasst von
Hong-Yi Su
Publikationsdatum
01.06.2020
Verlag
Springer US
Erschienen in
Quantum Information Processing / Ausgabe 6/2020
Print ISSN: 1570-0755
Elektronische ISSN: 1573-1332
DOI
https://doi.org/10.1007/s11128-020-02663-z

Weitere Artikel der Ausgabe 6/2020

Quantum Information Processing 6/2020 Zur Ausgabe

Neuer Inhalt