Cryptographic robustness of practical quantum cryptography: BB84 key distribution protocol

被引:4
|
作者
Molotkov, S. N. [1 ,2 ]
机构
[1] Russian Acad Sci, Inst Solid State Phys, Chernogolovka 142432, Moscow Oblast, Russia
[2] Moscow MV Lomonosov State Univ, Fac Computat Math & Cybernet, Moscow 119899, Russia
基金
俄罗斯基础研究基金会;
关键词
D O I
10.1134/S1063776108070030
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
In real fiber-optic quantum cryptography systems, the avalanche photodiodes are not perfect, the source of quantum states is not a single-photon one, and the communication channel is lossy. For these reasons, key distribution is impossible under certain conditions for the system parameters. A simple analysis is performed to find relations between the parameters of real cryptography systems and the length of the quantum channel that guarantee secure quantum key distribution when the eavesdropper's capabilities are limited only by fundamental laws of quantum mechanics while the devices employed by the legitimate users are based on current technologies. Critical values are determined for the rate of secure real-time key generation that can be reached under the current technology level. Calculations show that the upper bound on channel length can be as high as 300 km for imperfect photodetectors (avalanche photodiodes) with present-day quantum efficiency (eta approximate to 20%) and dark count probability (p(dark)similar to 10(-7)).
引用
收藏
页码:28 / 48
页数:21
相关论文
共 50 条
  • [41] Explicit attack on the key in quantum cryptography (BB84 protocol) reaching the theoretical error limit Qc ≈ 11%
    Molotkov, S. N.
    Timofeev, A. V.
    JETP LETTERS, 2007, 85 (10) : 524 - 529
  • [42] Influence of experimental parameters inherent to optical fibers on Quantum Key Distribution, the protocol BB84
    Bouchoucha, L.
    Berrah, S.
    Sellami, M.
    SEMICONDUCTOR PHYSICS QUANTUM ELECTRONICS & OPTOELECTRONICS, 2018, 21 (01) : 73 - 79
  • [43] A Novel Basis Splitting Eavesdropping Scheme in Quantum Cryptography Based on the BB84 Protocol
    赵楠
    朱畅华
    权东晓
    Chinese Physics Letters, 2015, (08) : 26 - 30
  • [44] A Novel Basis Splitting Eavesdropping Scheme in Quantum Cryptography Based on the BB84 Protocol
    Zhao Nan
    Zhu Chang-Hua
    Quan Dong-Xiao
    CHINESE PHYSICS LETTERS, 2015, 32 (08)
  • [45] FPGA-Based Implementation of an Underwater Quantum Key Distribution System With BB84 Protocol
    Kebapci, Burak
    Levent, Vecdi Emre
    Ergin, Sude
    Mutlu, Gorkem
    Baglica, Ibrahim
    Tosun, Anilcan
    Paglierani, Pietro
    Pelekanakis, Konstantinos
    Petroccia, Roberto
    Alves, Joao
    Uysal, Murat
    IEEE PHOTONICS JOURNAL, 2023, 15 (04):
  • [46] A Novel Basis Splitting Eavesdropping Scheme in Quantum Cryptography Based on the BB84 Protocol
    赵楠
    朱畅华
    权东晓
    Chinese Physics Letters, 2015, 32 (08) : 26 - 30
  • [47] Simulation Study of Single Quantum Channel BB84 Quantum Key Distribution
    Foong, Oi-Mean
    Low, Tang Jung
    Hong, Kah Wing
    IT CONVERGENCE AND SECURITY 2017, VOL 2, 2018, 450 : 159 - 167
  • [48] Security of biased BB84 quantum key distribution with finite resource
    赵良圆
    李宏伟
    银振强
    陈巍
    尤娟
    韩正甫
    Chinese Physics B, 2014, (10) : 28 - 35
  • [49] Security of biased BB84 quantum key distribution with finite resource
    Zhao Liang-Yuan
    Li Hong-Wei
    Yin Zhen-Qiang
    Chen Wei
    You Juan
    Han Zheng-Fu
    CHINESE PHYSICS B, 2014, 23 (10)
  • [50] Shor and Preskill's and Mayers's security proof for the BB84 quantum key distribution protocol
    D. Mayers
    The European Physical Journal D - Atomic, Molecular, Optical and Plasma Physics, 2002, 18 : 161 - 170