Modification of B92 protocol and the proof of its unconditional security

被引:0
|
作者
Zhang, Quan [1 ]
Tang, Chao-Jing [1 ]
Zhang, Sen-Qiang [1 ]
机构
[1] Sch. Electronical Sci. and Technol., Natl. Univ. of Deference Technology, Changsha 410073, China
来源
Wuli Xuebao/Acta Physica Sinica | 2002年 / 51卷 / 07期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
Shor and Preskill's method with which thy proved the unconditional security of BB84 quantum key distribution protocol was analyzed first. We also indicated that their method could not be applied to prove the unconditional security of B92 scheme directly. In order to take advantage of Shor-Preskill's techniques in their proof of the unconditional security of BB84, we have introduced in this paper a transformation that can exchange between BB84 and B92. By proving that the transformed B92 protocol leaks no more information to eavesdropper, we demonstrate the unconditional security of B92. We also solve the problem how to prove the unconditional security of B92 with Shor-Preskill's method.
引用
收藏
页码:1446 / 1447
相关论文
共 50 条
  • [31] Authenticated B92 QKD protocol employing synchronized optical chaotic systems
    Aleksandar D. Stojanovic
    Rubens Viana Ramos
    Petar S. Matavulj
    Optical and Quantum Electronics, 2016, 48
  • [32] Key Rate of the B92 Quantum Key Distribution Protocol with Finite Qubits
    Sasaki, Hiroaki
    Matsumoto, Ryutaroh
    Uyematsu, Tomohiko
    2015 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2015, : 696 - 699
  • [33] Hueckel treatment of B32 and B92
    Huang, F. Q.
    Tang, A. C.
    Journal of Molecular Structure, 366 (03):
  • [34] Simple proof of the unconditional security of the Bennett 1992 quantum key distribution protocol
    Quan, Zhang
    Chaojing, Tang
    2002, American Physical Society (65):
  • [35] Security of B92 quantum cryptography against individual attack over realistic channel
    Tamaki, K
    Koashi, M
    Imoto, N
    CLEO(R)/PACIFIC RIM 2001, POSTDEADLINE PAPER, 2001, : 10 - 11
  • [36] Simple proof of the unconditional security of the Bennett 1992 quantum key distribution protocol
    Zhang, Q
    Tang, CJ
    PHYSICAL REVIEW A, 2002, 65 (06): : 6
  • [37] Hands-On Quantum Cryptography: Experimentation with the B92 Protocol Using Pulsed Lasers
    Gandelman, Sara P.
    Maslennikov, Alona
    Rozenman, Georgi Gary
    PHOTONICS, 2025, 12 (03)
  • [38] Efficient Quantum Key Distribution Scheme and a Proof of Its Unconditional Security
    Hoi-Kwong Lo
    H.F. Chau
    M. Ardehali
    Journal of Cryptology, 2005, 18 : 133 - 165
  • [39] Air power (Radio B92 in Kosovo)
    Martin, S
    INDEX ON CENSORSHIP, 1998, 27 (04) : 21 - 21
  • [40] Efficient quantum key distribution scheme and a proof of its unconditional security
    Lo, HK
    Chau, HF
    Ardehali, M
    JOURNAL OF CRYPTOLOGY, 2005, 18 (02) : 133 - 165