Modification of B92 protocol and the proof of its unconditional security

被引:0
|
作者
Zhang, Quan [1 ]
Tang, Chao-Jing [1 ]
Zhang, Sen-Qiang [1 ]
机构
[1] Sch. Electronical Sci. and Technol., Natl. Univ. of Deference Technology, Changsha 410073, China
来源
Wuli Xuebao/Acta Physica Sinica | 2002年 / 51卷 / 07期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
Shor and Preskill's method with which thy proved the unconditional security of BB84 quantum key distribution protocol was analyzed first. We also indicated that their method could not be applied to prove the unconditional security of B92 scheme directly. In order to take advantage of Shor-Preskill's techniques in their proof of the unconditional security of BB84, we have introduced in this paper a transformation that can exchange between BB84 and B92. By proving that the transformed B92 protocol leaks no more information to eavesdropper, we demonstrate the unconditional security of B92. We also solve the problem how to prove the unconditional security of B92 with Shor-Preskill's method.
引用
收藏
页码:1446 / 1447
相关论文
共 50 条
  • [21] B92 Protocol Analysis Related to the Same Basis Eavesdropping
    Su, Bin-bin
    Zhou, Yuan-yuan
    Zhou, Xue-jun
    PROCEEDINGS OF 2016 IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND BIG DATA ANALYSIS (ICCCBDA 2016), 2016, : 189 - 192
  • [22] Experimental Implementation of B92 Quantum Key Distribution Protocol
    Mendonca, Fabio A.
    de Brito, Daniel B.
    Silva, Joao B. R.
    The, George A. P.
    Ramos, Rubens V.
    PROCEEDINGS OF THE IEEE INTERNATIONAL TELECOMMUNICATIONS SYMPOSIUM, VOLS 1 AND 2, 2006, : 712 - 717
  • [23] Analysis of a High-Dimensional Extended B92 Protocol
    Hasan Iqbal
    Walter O. Krawec
    Quantum Information Processing, 2021, 20
  • [24] Design a new protocol and comparison with B92 protocol for quantum key distribution
    Kalra, Manish
    Poonia, Ramesh C.
    INTERNATIONAL JOURNAL OF INTERNET PROTOCOL TECHNOLOGY, 2019, 12 (03) : 153 - 156
  • [25] Comment on “flexible protocol for quantum private query based on B92 protocol”
    Yan Chang
    Shi-Bin Zhang
    Jing-Min Zhu
    Quantum Information Processing, 2017, 16
  • [26] A Comparison of Several Implementations of B92 Quantum Key Distribution Protocol
    Anghel, Caralin
    Istrate, Adrian
    Vlase, Mihai
    2022 26TH INTERNATIONAL CONFERENCE ON SYSTEM THEORY, CONTROL AND COMPUTING (ICSTCC), 2022, : 374 - 379
  • [27] Software development for b92 quantum key distribution communication protocol
    Wijesekera, Shirantha
    Palit, Sajal
    Balachandran, Bala
    6TH IEEE/ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE, PROCEEDINGS, 2007, : 274 - +
  • [28] Authenticated B92 QKD protocol employing synchronized optical chaotic systems
    Stojanovic, Aleksandar D.
    Ramos, Rubens Viana
    Matavulj, Petar S.
    OPTICAL AND QUANTUM ELECTRONICS, 2016, 48 (05)
  • [29] Free-Space QKD with Modulating Retroreflectors Based on the B92 Protocol
    Zhu, Minghao
    Hu, Min
    Guo, Banghong
    ENTROPY, 2022, 24 (02)
  • [30] Simulation of quantum-cryptographic B92 protocol in the plug and play system
    Ramos, RV
    Souza, RF
    IMOC 2001: PROCEEDINGS OF THE 2001 SBMO/IEEE MTT-S INTERNATIONAL MICROWAVE AND OPTOELECTRONICS CONFERENCE: THE CHALLENGE OF THE NEW MILLENIUM: TECHNOLOGICAL DEVELOPMENT WITH ENVIRONMENTAL CONSCIOUSNESS, 2001, : 159 - 162