An improved scheme that the random matrix transformation used for BB84 protocol

被引:0
|
作者
Cui Shu-Min [1 ]
Ma Li-Hua [1 ]
Shi Lei [1 ]
Xu Zhi-Yan [1 ]
Hong Hua [1 ]
Chen Xiao-Ping [1 ]
机构
[1] Air Force Engn Univ, Xian 710077, Shan Xi, Peoples R China
关键词
Quantum Key Distribution; BB84; protocol; matrix transformation; key generation rate;
D O I
10.1117/12.2075882
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The bit error rate is raised by the presence of the noise when the quantum key transmits in practice. So both sides of communication can not judge the presence of eavesdropping. For this issue, an improved scheme based on BB84 protocol is proposed by a paper of Luanxin that a matrix transformation is carried out for every quantum of both sides. The advantage of the transformation is that the eavesdropper can be found easily. But the disadvantage is that it leads to a low key generation rate. In this paper, an improvement that a matrix transformation is carried out randomly for the quantum of both sides based on the scheme of Luanxin is proposed. The result shows that not only the presence of eavesdropping can be judged easily, but also the key generation rate is increased significantly.
引用
收藏
页数:8
相关论文
共 50 条
  • [1] Scheme of the arrangement for attack on the protocol BB84
    Khokhlov, D. L.
    OPTIK, 2016, 127 (18): : 7083 - 7087
  • [2] Comment on "Scheme of the arrangement for attack on the protocol BB84''
    Hance, Jonte
    Rarity, John
    OPTIK, 2021, 243
  • [3] The Improvement of QKD Scheme Based on BB84 Protocol
    Li, Hui-Fang
    Zhu, Li-Xin
    Wang, Kai
    Wang, Kai-Bin
    2016 INTERNATIONAL CONFERENCE ON INFORMATION SYSTEM AND ARTIFICIAL INTELLIGENCE (ISAI 2016), 2016, : 314 - 317
  • [4] Noise tolerance of the BB84 protocol with random privacy amplification
    Watanabe, Shun
    Matsumoto, Ryutaroh
    Uyematsu, Tomohiko
    INTERNATIONAL JOURNAL OF QUANTUM INFORMATION, 2006, 4 (06) : 935 - 946
  • [5] Noise tolerance of the BB84 protocol with random privacy amplification
    Watanabe, S
    Matsumoto, R
    Uyematsu, T
    2005 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), VOLS 1 AND 2, 2005, : 1013 - 1017
  • [6] A Simulative Comparison of BB84 Protocol with its Improved Version
    Sharifi, Mohsen
    Azizi, Hooshang
    JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY, 2007, 7 (03): : 204 - 208
  • [7] Bases selection with pseudo-random functions in BB84 scheme
    Dervisevic, Emir
    Voznak, Miroslav
    Mehic, Miralem
    HELIYON, 2024, 10 (01)
  • [8] Semi device independence of the BB84 protocol
    Woodhead, Erik
    NEW JOURNAL OF PHYSICS, 2016, 18
  • [9] Quantum scheme for an optimal attack on quantum key distribution protocol BB84
    Kronberg D.A.
    Molotkov S.N.
    Bulletin of the Russian Academy of Sciences: Physics, 2010, 74 (7) : 912 - 918
  • [10] A Novel Basis Splitting Eavesdropping Scheme in Quantum Cryptography Based on the BB84 Protocol
    赵楠
    朱畅华
    权东晓
    Chinese Physics Letters, 2015, (08) : 26 - 30