Cryptographic robustness of practical quantum cryptography: BB84 key distribution protocol

被引:4
|
作者
Molotkov, S. N. [1 ,2 ]
机构
[1] Russian Acad Sci, Inst Solid State Phys, Chernogolovka 142432, Moscow Oblast, Russia
[2] Moscow MV Lomonosov State Univ, Fac Computat Math & Cybernet, Moscow 119899, Russia
基金
俄罗斯基础研究基金会;
关键词
D O I
10.1134/S1063776108070030
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
In real fiber-optic quantum cryptography systems, the avalanche photodiodes are not perfect, the source of quantum states is not a single-photon one, and the communication channel is lossy. For these reasons, key distribution is impossible under certain conditions for the system parameters. A simple analysis is performed to find relations between the parameters of real cryptography systems and the length of the quantum channel that guarantee secure quantum key distribution when the eavesdropper's capabilities are limited only by fundamental laws of quantum mechanics while the devices employed by the legitimate users are based on current technologies. Critical values are determined for the rate of secure real-time key generation that can be reached under the current technology level. Calculations show that the upper bound on channel length can be as high as 300 km for imperfect photodetectors (avalanche photodiodes) with present-day quantum efficiency (eta approximate to 20%) and dark count probability (p(dark)similar to 10(-7)).
引用
收藏
页码:28 / 48
页数:21
相关论文
共 50 条
  • [21] Modified BB84 quantum key distribution protocol robust to source imperfections
    Pereira, Margarida
    Currás-Lorenzo, Guillermo
    Navarrete, Álvaro
    Mizutani, Akihiro
    Kato, Go
    Curty, Marcos
    Tamaki, Kiyoshi
    arXiv, 2022,
  • [22] Practical decoy-state BB84 quantum key distribution with quantum memory
    李咸柯
    宋小谦
    郭其伟
    周星宇
    王琴
    Chinese Physics B, 2021, (06) : 77 - 80
  • [23] How decoherence affects the security of BB84 quantum key distribution protocol
    Okula, Robert
    Mironowicz, Piotr
    QUANTUM INFORMATION PROCESSING, 2025, 24 (02)
  • [24] Practical decoy-state BB84 quantum key distribution with quantum memory*
    Li, Xian-Ke
    Song, Xiao-Qian
    Guo, Qi-Wei
    Zhou, Xing-Yu
    Wang, Qin
    CHINESE PHYSICS B, 2021, 30 (06)
  • [25] Entropy estimates for individual attacks on the BB84 protocol for quantum key distribution
    Myers, JM
    Wu, TT
    Pearson, D
    QUANTUM INFORMATION AND COMPUTATION II, 2004, 5436 : 36 - 47
  • [26] A GAME THEORETIC APPROACH TO STUDY THE QUANTUM KEY DISTRIBUTION BB84 PROTOCOL
    Houshmand, Mahboobeh
    Houshmand, Monireh
    Mashhadi, Habib Rajabi
    INTERNATIONAL JOURNAL OF QUANTUM INFORMATION, 2011, 9 (04) : 1133 - 1146
  • [27] Security of Entanglement Based Version of BB84 protocol for Quantum Cryptography
    Sharma, Anand
    Ojha, Vibha
    Lenka, S. K.
    PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 9 (ICCSIT 2010), 2010, : 615 - 619
  • [28] A SECURE METHOD OF COMMUNICATION THROUGH BB84 PROTOCOL IN QUANTUM KEY DISTRIBUTION
    Anilkumar, Chunduru
    Lenka, Swathi
    Neelima, N.
    Sathishkumar, V. E.
    SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2024, 25 (01): : 25 - 33
  • [29] Game Theory based View to the Quantum Key Distribution BB84 Protocol
    Houshmand, Mahboobeh
    Houshmand, Monireh
    Mashhadi, Habib Rajabi
    2010 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY AND SECURITY INFORMATICS (IITSI 2010), 2010, : 332 - 336
  • [30] Modified BB84 quantum key distribution protocol robust to source imperfections
    Pereira, Margarida
    Curras-Lorenzo, Guillermo
    Navarrete, Alvaro
    Mizutani, Akihiro
    Kato, Go
    Curty, Marcos
    Tamaki, Kiyoshi
    PHYSICAL REVIEW RESEARCH, 2023, 5 (02):