Cryptographic robustness of practical quantum cryptography: BB84 key distribution protocol

被引:4
|
作者
Molotkov, S. N. [1 ,2 ]
机构
[1] Russian Acad Sci, Inst Solid State Phys, Chernogolovka 142432, Moscow Oblast, Russia
[2] Moscow MV Lomonosov State Univ, Fac Computat Math & Cybernet, Moscow 119899, Russia
基金
俄罗斯基础研究基金会;
关键词
D O I
10.1134/S1063776108070030
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
In real fiber-optic quantum cryptography systems, the avalanche photodiodes are not perfect, the source of quantum states is not a single-photon one, and the communication channel is lossy. For these reasons, key distribution is impossible under certain conditions for the system parameters. A simple analysis is performed to find relations between the parameters of real cryptography systems and the length of the quantum channel that guarantee secure quantum key distribution when the eavesdropper's capabilities are limited only by fundamental laws of quantum mechanics while the devices employed by the legitimate users are based on current technologies. Critical values are determined for the rate of secure real-time key generation that can be reached under the current technology level. Calculations show that the upper bound on channel length can be as high as 300 km for imperfect photodetectors (avalanche photodiodes) with present-day quantum efficiency (eta approximate to 20%) and dark count probability (p(dark)similar to 10(-7)).
引用
收藏
页码:28 / 48
页数:21
相关论文
共 50 条
  • [1] Cryptographic robustness of practical quantum cryptography: BB84 key distribution protocol
    S. N. Molotkov
    Journal of Experimental and Theoretical Physics, 2008, 107 : 28 - 48
  • [2] Security of practical BB84 quantum key distribution
    Inamori, H
    ALGORITHMICA, 2002, 34 (04) : 366 - 371
  • [3] Security of Practical BB84 Quantum Key Distribution
    Algorithmica, 2002, 34 : 366 - 371
  • [4] PRACTICAL QUANTUM KEY AGREEMENT PROTOCOL BASED ON BB84
    Wang, Ping
    Zhang, R.
    Sun, Zhiwei
    QUANTUM INFORMATION & COMPUTATION, 2022, 22 (3-4) : 241 - 250
  • [5] Secrecy capacity in the BB84 protocol of quantum cryptography
    Brandt, HE
    QUANTUM COMMUNICATION, MEASUREMENT AND COMPUTING, PROCEEDINGS, 2003, : 383 - 386
  • [6] A Playful Sketch of the Quantum Cryptography Protocol BB84
    Calderbank, Robert
    IEEE BITS the Information Theory Magazine, 2022, 2 (03):
  • [7] Simulation of BB84 and proposed protocol for quantum key distribution
    Kalra, Manish
    Poonia, Ramesh C.
    JOURNAL OF STATISTICS & MANAGEMENT SYSTEMS, 2018, 21 (04): : 661 - 666
  • [8] Practical underwater quantum key distribution based on decoy-state BB84 protocol
    Dong, Shanchuan
    Yu, Yonghe
    Zheng, Shangshuai
    Zhu, Qiming
    Gai, Lei
    Li, Wendong
    Gu, Yongjian
    APPLIED OPTICS, 2022, 61 (15) : 4471 - 4477
  • [9] Randomness determines practical security of BB84 quantum key distribution
    Hong-Wei Li
    Zhen-Qiang Yin
    Shuang Wang
    Yong-Jun Qian
    Wei Chen
    Guang-Can Guo
    Zheng-Fu Han
    Scientific Reports, 5
  • [10] Quantum key distribution secure threshold based on BB84 protocol
    Zhao Nan
    Pei Chang-Xing
    Liu Dan
    Quan Dong-Xiao
    Sun Xiao-Nan
    ACTA PHYSICA SINICA, 2011, 60 (09)