An improved scheme that the random matrix transformation used for BB84 protocol

被引:0
|
作者
Cui Shu-Min [1 ]
Ma Li-Hua [1 ]
Shi Lei [1 ]
Xu Zhi-Yan [1 ]
Hong Hua [1 ]
Chen Xiao-Ping [1 ]
机构
[1] Air Force Engn Univ, Xian 710077, Shan Xi, Peoples R China
关键词
Quantum Key Distribution; BB84; protocol; matrix transformation; key generation rate;
D O I
10.1117/12.2075882
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The bit error rate is raised by the presence of the noise when the quantum key transmits in practice. So both sides of communication can not judge the presence of eavesdropping. For this issue, an improved scheme based on BB84 protocol is proposed by a paper of Luanxin that a matrix transformation is carried out for every quantum of both sides. The advantage of the transformation is that the eavesdropper can be found easily. But the disadvantage is that it leads to a low key generation rate. In this paper, an improvement that a matrix transformation is carried out randomly for the quantum of both sides based on the scheme of Luanxin is proposed. The result shows that not only the presence of eavesdropping can be judged easily, but also the key generation rate is increased significantly.
引用
收藏
页数:8
相关论文
共 50 条
  • [21] PRACTICAL QUANTUM KEY AGREEMENT PROTOCOL BASED ON BB84
    Wang, Ping
    Zhang, R.
    Sun, Zhiwei
    QUANTUM INFORMATION & COMPUTATION, 2022, 22 (3-4) : 241 - 250
  • [22] Generalized PPM-based BB84 QKD Protocol
    Zhang, Yaqun
    Djordjevic, Ivan B.
    2014 16TH INTERNATIONAL CONFERENCE ON TRANSPARENT OPTICAL NETWORKS (ICTON), 2014,
  • [23] Simulation of BB84 and proposed protocol for quantum key distribution
    Kalra, Manish
    Poonia, Ramesh C.
    JOURNAL OF STATISTICS & MANAGEMENT SYSTEMS, 2018, 21 (04): : 661 - 666
  • [24] On the Breidbart eavesdropping problem of the extended BB84 QKD protocol
    Yang, L
    Wu, LA
    Liu, SH
    ACTA PHYSICA SINICA, 2002, 51 (05) : 961 - 965
  • [25] Eevesdropping of practical QKD system based on BB84 protocol
    Liu, Jingfeng
    Liang, Ruisheng
    Tang, Zhilie
    Wei, Zhengjun
    Chen, Zhixin
    Liao, Changjun
    Liu, Songhao
    Guangzi Xuebao/Acta Photonica Sinica, 2004, 33 (11):
  • [26] On the Breidbart eavesdropping problem of the extended BB84 QKD protocol
    Yang, Li
    Wu, Ling-An
    Liu, Song-Hao
    Wuli Xuebao/Acta Physica Sinica, 2002, 51 (05):
  • [27] Secure direct communication using deterministic BB84 protocol
    Hwang, Tzonelih
    Li, Chuan-Ming
    Lee, Narn-Yih
    INTERNATIONAL JOURNAL OF MODERN PHYSICS C, 2008, 19 (04): : 625 - 635
  • [28] Design a New Protocol and Compare with BB84 Protocol for Quantum Key Distribution
    Kalra, Manish
    Poonia, Ramesh C.
    SOFT COMPUTING FOR PROBLEM SOLVING, 2019, 817 : 969 - 978
  • [29] Optimizing the decoy-state BB84 QKD protocol parameters
    Attema, Thomas
    Bosman, Joost W.
    Neumann, Niels M. P.
    QUANTUM INFORMATION PROCESSING, 2021, 20 (04)
  • [30] Simulation of BB84 Quantum Key Exchange Protocol and Attack Analysis
    Adiyaman, Ilker Burak
    Sogukpinar, Ibrahim
    2020 5TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), 2020, : 203 - 207