Modification of B92 protocol and the proof of its unconditional security

被引:0
|
作者
Zhang, Quan [1 ]
Tang, Chao-Jing [1 ]
Zhang, Sen-Qiang [1 ]
机构
[1] Sch. Electronical Sci. and Technol., Natl. Univ. of Deference Technology, Changsha 410073, China
来源
Wuli Xuebao/Acta Physica Sinica | 2002年 / 51卷 / 07期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
Shor and Preskill's method with which thy proved the unconditional security of BB84 quantum key distribution protocol was analyzed first. We also indicated that their method could not be applied to prove the unconditional security of B92 scheme directly. In order to take advantage of Shor-Preskill's techniques in their proof of the unconditional security of BB84, we have introduced in this paper a transformation that can exchange between BB84 and B92. By proving that the transformed B92 protocol leaks no more information to eavesdropper, we demonstrate the unconditional security of B92. We also solve the problem how to prove the unconditional security of B92 with Shor-Preskill's method.
引用
收藏
页码:1446 / 1447
相关论文
共 50 条
  • [1] Modification of B92 protocol and the proof of its unconditional security
    Zhang, Q
    Tang, CJ
    Zhang, SQ
    ACTA PHYSICA SINICA, 2002, 51 (07) : 1439 - 1447
  • [2] Security of B92 protocol with uninformative states in asymptotic limit with composable security
    Ali, N.
    Radzi, N. A. N. Mat
    Aljunid, S. A.
    Endut, R.
    2ND INTERNATIONAL CONFERENCE ON APPLIED PHOTONICS AND ELECTRONICS 2019 (INCAPE 2019), 2020, 2203
  • [3] Simulating B92 Protocol in Depolarizing Channel
    Xu, Xiaofang
    Chen, Xiaoyu
    2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,
  • [4] A Semi-Quantum Extended B92 Protocol and its Analysis
    Krawec, Walter O.
    Markelon, Sam A.
    QUANTUM INFORMATION SCIENCE, SENSING, AND COMPUTATION XII, 2020, 11391
  • [5] The Security Analysis of Quantum B92 Protocol in Collective-Rotation Noise Channel
    Leilei Li
    Jian Li
    Chaoyang Li
    Hengji Li
    Yuguang Yang
    Xiubo Chen
    International Journal of Theoretical Physics, 2019, 58 : 1326 - 1336
  • [6] Information investigation for B92 protocol in quantum cryptography
    Zou, M
    Zhang, GP
    QUANTUM OPTICS AND APPLICATIONS IN COMPUTING AND COMMUNICATIONS II, 2005, 5631 : 181 - 191
  • [7] The Security Analysis of Quantum B92 Protocol in Collective-Rotation Noise Channel
    Li, Leilei
    Li, Jian
    Li, Chaoyang
    Li, Hengji
    Yang, Yuguang
    Chen, Xiubo
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2019, 58 (04) : 1326 - 1336
  • [8] Efficiency of the Eavesdropping in B92 QKD Protocol with a QCM
    Siomau, Michael
    Fritzsche, Stephan
    QUANTUM COMMUNICATION AND QUANTUM NETWORKING, 2010, 36 : 267 - +
  • [9] Calculation of key reduction for B92 QKD protocol
    Mehic, Miralem
    Partila, Pavol
    Tovarek, Jaromir
    Voznak, Miroslav
    QUANTUM INFORMATION AND COMPUTATION XIII, 2015, 9500
  • [10] Quantum Steganography Based on the B92 Quantum Protocol
    Tudorache, Alexandru-Gabriel
    Manta, Vasile
    Caraiman, Simona
    MATHEMATICS, 2022, 10 (16)