Modification of B92 protocol and the proof of its unconditional security

被引:0
|
作者
Zhang, Quan [1 ]
Tang, Chao-Jing [1 ]
Zhang, Sen-Qiang [1 ]
机构
[1] Sch. Electronical Sci. and Technol., Natl. Univ. of Deference Technology, Changsha 410073, China
来源
Wuli Xuebao/Acta Physica Sinica | 2002年 / 51卷 / 07期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
Shor and Preskill's method with which thy proved the unconditional security of BB84 quantum key distribution protocol was analyzed first. We also indicated that their method could not be applied to prove the unconditional security of B92 scheme directly. In order to take advantage of Shor-Preskill's techniques in their proof of the unconditional security of BB84, we have introduced in this paper a transformation that can exchange between BB84 and B92. By proving that the transformed B92 protocol leaks no more information to eavesdropper, we demonstrate the unconditional security of B92. We also solve the problem how to prove the unconditional security of B92 with Shor-Preskill's method.
引用
收藏
页码:1446 / 1447
相关论文
共 50 条
  • [41] K08: a generalized BB84/B92 protocol in quantum cryptography
    Kartalopoulos, Stamatios V.
    SECURITY AND COMMUNICATION NETWORKS, 2009, 2 (06) : 686 - 693
  • [42] Unambiguous State Discrimination Attack on the B92 Protocol of Quantum Key Distribution with Single Photons
    Horoshko, D. B.
    Kilin, S. Ya
    NONLINEAR PHENOMENA IN COMPLEX SYSTEMS, 2021, 24 (03): : 222 - 229
  • [43] Quantum ANDOS protocol with unconditional security
    Yang, Wei
    Huang, Liusheng
    Xiao, Mingjun
    Jing, Weiwei
    ADVANCES IN NATURAL COMPUTATION, PT 2, 2006, 4222 : 20 - 30
  • [44] B92 of Belgrade -: Free voices on the airwaves and the Internet
    Pantic, D
    MEDIA STUDIES JOURNAL, 1999, 13 (03): : 176 - 181
  • [45] An Efficient Authentication Protocol of WLAN and its Security Proof
    Zhang, Haojun
    Chen, Li
    2008 THIRD INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA, VOLS 1-3, 2008, : 1076 - +
  • [46] Realization of B92 QKD protocol using id3100 Clavis2 system
    Senekane, Makhamisa
    Mirza, Abdul
    Mafu, Mhlambululi
    Petruccione, Francesco
    PROCEEDINGS OF SAIP2012: THE 57TH ANNUAL CONFERENCE OF THE SOUTH AFRICAN INSTITUTE OF PHYSICS, 2012, : 299 - 304
  • [47] A simple proof of the unconditional security of quantum key distribution
    Lo, HK
    JOURNAL OF PHYSICS A-MATHEMATICAL AND GENERAL, 2001, 34 (35): : 6957 - 6967
  • [48] A simple proof of unconditional security of relativistic quantum cryptography
    Molotkov, SN
    Nazin, SS
    JOURNAL OF EXPERIMENTAL AND THEORETICAL PHYSICS, 2001, 92 (05) : 871 - 878
  • [49] A simple proof of unconditional security of relativistic quantum cryptography
    S. N. Molotkov
    S. S. Nazin
    Journal of Experimental and Theoretical Physics, 2001, 92 : 871 - 878
  • [50] Continuous variable B92 quantum key distribution protocol using single photon added and subtracted coherent states
    Srikara, S.
    Thapliyal, Kishore
    Pathak, Anirban
    QUANTUM INFORMATION PROCESSING, 2020, 19 (10)