An improved scheme that the random matrix transformation used for BB84 protocol

被引:0
|
作者
Cui Shu-Min [1 ]
Ma Li-Hua [1 ]
Shi Lei [1 ]
Xu Zhi-Yan [1 ]
Hong Hua [1 ]
Chen Xiao-Ping [1 ]
机构
[1] Air Force Engn Univ, Xian 710077, Shan Xi, Peoples R China
关键词
Quantum Key Distribution; BB84; protocol; matrix transformation; key generation rate;
D O I
10.1117/12.2075882
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The bit error rate is raised by the presence of the noise when the quantum key transmits in practice. So both sides of communication can not judge the presence of eavesdropping. For this issue, an improved scheme based on BB84 protocol is proposed by a paper of Luanxin that a matrix transformation is carried out for every quantum of both sides. The advantage of the transformation is that the eavesdropper can be found easily. But the disadvantage is that it leads to a low key generation rate. In this paper, an improvement that a matrix transformation is carried out randomly for the quantum of both sides based on the scheme of Luanxin is proposed. The result shows that not only the presence of eavesdropping can be judged easily, but also the key generation rate is increased significantly.
引用
收藏
页数:8
相关论文
共 50 条
  • [31] Narrow basis angle doubles secret key in the BB84 protocol
    Matsumoto, Ryutaroh
    Watanabe, Shun
    JOURNAL OF PHYSICS A-MATHEMATICAL AND THEORETICAL, 2010, 43 (14)
  • [32] Quantum key distribution secure threshold based on BB84 protocol
    Zhao Nan
    Pei Chang-Xing
    Liu Dan
    Quan Dong-Xiao
    Sun Xiao-Nan
    ACTA PHYSICA SINICA, 2011, 60 (09)
  • [33] Cloud Data Security through BB84 Protocol and Genetic Algorithm
    Kumar, Jaydip
    Saxena, Vipin
    BAGHDAD SCIENCE JOURNAL, 2022, 19 (06) : 1445 - 1453
  • [34] Man-in-the-middle Attack on BB84 Protocol and its Defence
    Wang Yong
    Wang Huadeng
    Li Zhaohong
    Huang Jinxiang
    2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 3, 2009, : 433 - 434
  • [35] Security of Entanglement Based Version of BB84 protocol for Quantum Cryptography
    Sharma, Anand
    Ojha, Vibha
    Lenka, S. K.
    PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 9 (ICCSIT 2010), 2010, : 615 - 619
  • [36] Simple proof of security of the BB84 quantum key distribution protocol
    Shor, PW
    Preskill, J
    PHYSICAL REVIEW LETTERS, 2000, 85 (02) : 441 - 444
  • [37] Optimizing the decoy-state BB84 QKD protocol parameters
    Thomas Attema
    Joost W. Bosman
    Niels M. P. Neumann
    Quantum Information Processing, 2021, 20
  • [38] The FPGA Implementation of Quantum Key Distribution Based on BB84 protocol
    Li, Huifang
    Zhang, Minghui
    Wang, Kaibin
    PROCEEDINGS OF THE 2016 2ND WORKSHOP ON ADVANCED RESEARCH AND TECHNOLOGY IN INDUSTRY APPLICATIONS, 2016, 81 : 1571 - 1574
  • [39] On the secrecy of a simple and effective implementation of BB84 quantum cryptography protocol
    Molotkov, S. N.
    LASER PHYSICS LETTERS, 2019, 16 (07)
  • [40] BB84 Protocol Simulation with Applying of Cascade Error Correction Method
    Turker, Idris
    Nacar, Mehmet Akif
    Tenekeci, Mehmet Emin
    2018 26TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2018,