On the Breidbart eavesdropping problem of the extended BB84 QKD protocol

被引:0
|
作者
Yang, Li
Wu, Ling-An
Liu, Song-Hao
机构
[1] Stt. Key Lab. of Info. Security, Grad. Sch. of Chinese Acad. of Sci., Beijing 100039, China
[2] Institute of Physics, Chinese Academy of Sciences, Beijing 100080, China
[3] Institute of Quantum Electronics, Huanan Normal University, Guangzhou 510631, China
来源
Wuli Xuebao/Acta Physica Sinica | 2002年 / 51卷 / 05期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
We discuss the Breidbart eavesdropping scheme of the extended BB84 quantum key distribution protocol. Calculation of the effective average Alice/Eve mutual information after performing a standard error-correction under various intercept/resend strate-gies shows that the Breidbart eavesdropping/Breidbart resend strategy (B/B strategy) is the most effective one. Sine Alice and Bob can test openly whether there is the B/B eavesdropping by making use of the rejected data, we suggest an amendment of the BB84 protocol to reduce the requirements of the privacy amplification algorithm and hence reduce the quantum key loss. Finally, we present a quantum key regeneration method for error-correction which may be more secure than the standard error-correction process.
引用
收藏
相关论文
共 50 条
  • [31] Quantum Bit Commitment Combining with BB84 Protocol
    Zhang, Linxi
    Zhu, Changhua
    Zhao, Nan
    Pei, Changxing
    ELECTRICAL AND CONTROL ENGINEERING & MATERIALS SCIENCE AND MANUFACTURING, 2016, : 291 - 298
  • [32] Polarization-Encoded BB84 QKD Transmitter Sourced by a SiGe Light Emitter
    Honz, Florian
    Vokic, Nemanja
    Walther, Philip
    Huebel, Hannes
    Schrenk, Bernhard
    2023 OPTICAL FIBER COMMUNICATIONS CONFERENCE AND EXHIBITION, OFC, 2023,
  • [33] PRACTICAL QUANTUM KEY AGREEMENT PROTOCOL BASED ON BB84
    Wang, Ping
    Zhang, R.
    Sun, Zhiwei
    QUANTUM INFORMATION & COMPUTATION, 2022, 22 (3-4) : 241 - 250
  • [34] A Simulative Comparison of BB84 Protocol with its Improved Version
    Sharifi, Mohsen
    Azizi, Hooshang
    JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY, 2007, 7 (03): : 204 - 208
  • [35] Optimized QKD BB84 Protocol Using Quantum Dense Coding and CNOT Gates: Feasibility Based on Probabilistic Optical Devices
    Gueddana, Amor
    Attia, Moez
    Chatta, Rihab
    NONLINEAR OPTICS AND ITS APPLICATIONS VIII; AND QUANTUM OPTICS III, 2014, 9136
  • [36] Simulation of BB84 and proposed protocol for quantum key distribution
    Kalra, Manish
    Poonia, Ramesh C.
    JOURNAL OF STATISTICS & MANAGEMENT SYSTEMS, 2018, 21 (04): : 661 - 666
  • [37] Secure direct communication using deterministic BB84 protocol
    Hwang, Tzonelih
    Li, Chuan-Ming
    Lee, Narn-Yih
    INTERNATIONAL JOURNAL OF MODERN PHYSICS C, 2008, 19 (04): : 625 - 635
  • [38] Noise tolerance of the BB84 protocol with random privacy amplification
    Watanabe, Shun
    Matsumoto, Ryutaroh
    Uyematsu, Tomohiko
    INTERNATIONAL JOURNAL OF QUANTUM INFORMATION, 2006, 4 (06) : 935 - 946
  • [39] Noise tolerance of the BB84 protocol with random privacy amplification
    Watanabe, S
    Matsumoto, R
    Uyematsu, T
    2005 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), VOLS 1 AND 2, 2005, : 1013 - 1017
  • [40] Dual Secret Key Virtualization Through TCC Based Wavelength Allocation and BB84 Protocol in QKD over Optical Networks
    Sehgal, Shravan Kumar
    Gupta, Rashmi
    WIRELESS PERSONAL COMMUNICATIONS, 2024, 134 (03) : 1443 - 1468