On the Breidbart eavesdropping problem of the extended BB84 QKD protocol

被引:0
|
作者
Yang, Li
Wu, Ling-An
Liu, Song-Hao
机构
[1] Stt. Key Lab. of Info. Security, Grad. Sch. of Chinese Acad. of Sci., Beijing 100039, China
[2] Institute of Physics, Chinese Academy of Sciences, Beijing 100080, China
[3] Institute of Quantum Electronics, Huanan Normal University, Guangzhou 510631, China
来源
Wuli Xuebao/Acta Physica Sinica | 2002年 / 51卷 / 05期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
We discuss the Breidbart eavesdropping scheme of the extended BB84 quantum key distribution protocol. Calculation of the effective average Alice/Eve mutual information after performing a standard error-correction under various intercept/resend strate-gies shows that the Breidbart eavesdropping/Breidbart resend strategy (B/B strategy) is the most effective one. Sine Alice and Bob can test openly whether there is the B/B eavesdropping by making use of the rejected data, we suggest an amendment of the BB84 protocol to reduce the requirements of the privacy amplification algorithm and hence reduce the quantum key loss. Finally, we present a quantum key regeneration method for error-correction which may be more secure than the standard error-correction process.
引用
收藏
相关论文
共 50 条
  • [21] Composable security against collective attacks of a modified BB84 QKD protocol with information only in one basis
    Boyer, Michel
    Liss, Rotem
    Mor, Tal
    THEORETICAL COMPUTER SCIENCE, 2020, 801 : 96 - 109
  • [22] SQL injection principle against BB84 protocol
    Amellal, H.
    Meslouhi, A.
    Hassouni, Y.
    El Allati, A.
    2017 INTERNATIONAL CONFERENCE ON WIRELESS TECHNOLOGIES, EMBEDDED AND INTELLIGENT SYSTEMS (WITS), 2017,
  • [23] Secrecy capacity in the BB84 protocol of quantum cryptography
    Brandt, HE
    QUANTUM COMMUNICATION, MEASUREMENT AND COMPUTING, PROCEEDINGS, 2003, : 383 - 386
  • [24] A Playful Sketch of the Quantum Cryptography Protocol BB84
    Calderbank, Robert
    IEEE BITS the Information Theory Magazine, 2022, 2 (03):
  • [25] Simulating BB84 Protocol in Dephasing Qubit Channel
    Chen, Xiao-yu
    QUANTUM COMMUNICATION AND QUANTUM NETWORKING, 2010, 36 : 242 - 248
  • [26] Analysis of achievable distances of BB84 and KMB09 QKD protocols
    Khan, Muhammad Mubashir
    Arfeen, Asad
    Ahsan, Usama
    Ahmed, Saneeha
    Mumtaz, Tahreem
    INTERNATIONAL JOURNAL OF QUANTUM INFORMATION, 2020, 18 (06)
  • [27] On the Availability of the Decoy State BB84 QKD over a Terrestrial FSO Link
    Ntanos, Argiris
    Zavitsanos, Dimitris
    Lyras, Nikolaos K.
    Giannoulis, Giannis
    Avramopoulos, Hercules
    2021 INTERNATIONAL CONFERENCE ON OPTICAL NETWORK DESIGN AND MODELLING (ONDM), 2021,
  • [28] Comment on "Scheme of the arrangement for attack on the protocol BB84''
    Hance, Jonte
    Rarity, John
    OPTIK, 2021, 243
  • [29] Quantum key agreement protocol based on BB84
    Chong, Song-Kong
    Hwang, Tzonelih
    OPTICS COMMUNICATIONS, 2010, 283 (06) : 1192 - 1195
  • [30] Joint Eavesdropping on the BB84 Decoy State Protocol with an Arbitrary Passive Light-source Side Channel
    D. V. Babukhin
    D. V. Sych
    Lobachevskii Journal of Mathematics, 2024, 45 (6) : 2454 - 2465