Comprehensive Analysis of BB84, A Quantum Key Distribution Protocol
- URL: http://arxiv.org/abs/2312.05609v1
- Date: Sat, 9 Dec 2023 16:32:54 GMT
- Title: Comprehensive Analysis of BB84, A Quantum Key Distribution Protocol
- Authors: SujayKumar Reddy M and Chandra Mohan B
- Abstract summary: Quantum Key Distribution (QKD) is a technique that enables secure communication by sharing a secret key.
One of the most well-known QKD protocols is the BB84 protocol, proposed by Charles Bennett and Gilles Brassard in 1984.
- Score: 0.0
- License: http://creativecommons.org/publicdomain/zero/1.0/
- Abstract: Quantum Key Distribution (QKD) is a technique that enables secure
communication between two parties by sharing a secret key. One of the most
well-known QKD protocols is the BB84 protocol, proposed by Charles Bennett and
Gilles Brassard in 1984. In this protocol, Alice and Bob use a quantum channel
to exchange qubits, allowing them to generate a shared key that is resistant to
eavesdropping. This paper presents a comparative study of existing QKD schemes,
including the BB84 protocol, and highlights the advancements made in the BB84
protocol over the years. The study aims to provide a comprehensive overview of
the different QKD schemes and their strengths and weaknesses and demonstrate
QKDs working principles through existing simulations and implementations.
Through this study, we show that the BB84 protocol is a highly secure QKD
scheme that has been extensively studied and implemented in various settings.
Furthermore, we discuss the improvements made to the BB84 protocol to enhance
its security and practicality, including the use of decoy states and advanced
error correction techniques. Overall, this paper provides a comprehensive
analysis of QKD schemes, focusing on the BB84 protocol in secure communication
technologies.
Related papers
- Practical hybrid PQC-QKD protocols with enhanced security and performance [44.8840598334124]
We develop hybrid protocols by which QKD and PQC inter-operate within a joint quantum-classical network.
In particular, we consider different hybrid designs that may offer enhanced speed and/or security over the individual performance of either approach.
arXiv Detail & Related papers (2024-11-02T00:02:01Z) - Towards efficient and secure quantum-classical communication networks [47.27205216718476]
There are two primary approaches to achieving quantum-resistant security: quantum key distribution (QKD) and post-quantum cryptography (PQC)
We introduce the pros and cons of these protocols and explore how they can be combined to achieve a higher level of security and/or improved performance in key distribution.
We hope our discussion inspires further research into the design of hybrid cryptographic protocols for quantum-classical communication networks.
arXiv Detail & Related papers (2024-11-01T23:36:19Z) - Decoherence-assisted quantum key distribution [37.69303106863453]
We show that our method reduces the amount of information that an eavesdropper can obtain in the BB84 protocol under the entangling probe attack.
We demonstrate experimentally that Alice and Bob can agree on a scheme to that gives low values of the quantum bit error rate.
arXiv Detail & Related papers (2024-05-30T15:28:07Z) - The Road to Near-Capacity CV-QKD Reconciliation: An FEC-Agnostic Design [53.67135680812675]
A new codeword-based QKD reconciliation scheme is proposed.
Both the authenticated classical channel (ClC) and the quantum channel (QuC) are protected by separate forward error correction (FEC) coding schemes.
The proposed system makes QKD reconciliation compatible with a wide range of FEC schemes.
arXiv Detail & Related papers (2024-03-24T14:47:08Z) - Security of hybrid BB84 with heterodyne detection [0.0]
Quantum key distribution (QKD) promises everlasting security based on the laws of physics.
Recent hybrid QKD protocols have been introduced to leverage advantages from both categories.
We provide a rigorous security proof for a protocol introduced by Qi in 2021, where information is encoded in discrete variables.
arXiv Detail & Related papers (2024-02-26T19:00:01Z) - Practical quantum secure direct communication with squeezed states [55.41644538483948]
We report the first table-top experimental demonstration of a CV-QSDC system and assess its security.
This realization paves the way into future threat-less quantum metropolitan networks, compatible with coexisting advanced wavelength division multiplexing (WDM) systems.
arXiv Detail & Related papers (2023-06-25T19:23:42Z) - Modified BB84 quantum key distribution protocol robust to source
imperfections [1.53934570513443]
Bennett-Brassard 1984 (BB84) protocol is the most widely implemented quantum key distribution scheme.
We prove the security of the BB84 protocol in the presence of multiple source imperfections.
We show that the addition of a fourth state, while redundant in ideal conditions, significantly improves the estimation of the leaked information.
arXiv Detail & Related papers (2022-10-21T06:23:01Z) - Asymptotically Optimal prepare-measure Quantum Key Distribution Protocol [0.0]
In nearly four decades, although substantial QKD protocols are developed, the BB84 protocol and its variants are still the most researched ones.
We present an abstraction of prepare-measure QKD protocols and investigate two special cases which are optimal among all protocols coding by the same states.
Our analysis demonstrates that the optimal QBER bounds coding by qubits are about 27.28$%$ for both memory C-NOT attacks and memoryless C-NOT attacks.
arXiv Detail & Related papers (2021-10-05T12:13:37Z) - Quantum key distribution based on orthogonal state encoding [0.0]
Two quantum key distribution protocols are presented.
One does not need to employ order-rearrangement techniques while the other needs to.
We modify the protocols for implementing in noisy channels by applying the testing state method.
arXiv Detail & Related papers (2021-07-05T12:14:05Z) - Round-robin differential phase-time-shifting protocol for quantum key
distribution: theory and experiment [58.03659958248968]
Quantum key distribution (QKD) allows the establishment of common cryptographic keys among distant parties.
Recently, a QKD protocol that circumvents the need for monitoring signal disturbance, has been proposed and demonstrated in initial experiments.
We derive the security proofs of the round-robin differential phase-time-shifting protocol in the collective attack scenario.
Our results show that the RRDPTS protocol can achieve higher secret key rate in comparison with the RRDPS, in the condition of high quantum bit error rate.
arXiv Detail & Related papers (2021-03-15T15:20:09Z) - A polarization quantum key distribution scheme based on phase matching [0.0]
The Quantum Key Distribution protocol can encode a single quantum state and implements an information-theoretically secure key distribution protocol in communication.
This paper successfully gives the polarization scheme of this PM-QKD protocol, the bases in the polarization scheme are arbitrary, and eliminates detector side channel attacks.
The simulation results show that our protocol is superior to the BB84 protocol in terms of transmission distance under the fixed key rate.
arXiv Detail & Related papers (2020-03-02T10:33:18Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.