An improved scheme that the random matrix transformation used for BB84 protocol

被引:0
|
作者
Cui Shu-Min [1 ]
Ma Li-Hua [1 ]
Shi Lei [1 ]
Xu Zhi-Yan [1 ]
Hong Hua [1 ]
Chen Xiao-Ping [1 ]
机构
[1] Air Force Engn Univ, Xian 710077, Shan Xi, Peoples R China
关键词
Quantum Key Distribution; BB84; protocol; matrix transformation; key generation rate;
D O I
10.1117/12.2075882
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The bit error rate is raised by the presence of the noise when the quantum key transmits in practice. So both sides of communication can not judge the presence of eavesdropping. For this issue, an improved scheme based on BB84 protocol is proposed by a paper of Luanxin that a matrix transformation is carried out for every quantum of both sides. The advantage of the transformation is that the eavesdropper can be found easily. But the disadvantage is that it leads to a low key generation rate. In this paper, an improvement that a matrix transformation is carried out randomly for the quantum of both sides based on the scheme of Luanxin is proposed. The result shows that not only the presence of eavesdropping can be judged easily, but also the key generation rate is increased significantly.
引用
收藏
页数:8
相关论文
共 50 条
  • [41] An extended BB84 protocol for a repeatable quantum key distribution system
    Yang, L
    Wu, LA
    Liu, SH
    QUANTUM OPTICS IN COMPUTING AND COMMUNICATIONS, 2002, 4917 : 97 - 100
  • [42] EFFICIENCY OF THE QUANTUM KEY DISTRIBUTION SYSTEMS - A COMPARATIVE STUDY OF BB84 PROTOCOL WITH ITS IMPROVED VERSIONS
    Zisu, Liliana
    PROCEEDINGS OF THE ROMANIAN ACADEMY SERIES A-MATHEMATICS PHYSICS TECHNICAL SCIENCES INFORMATION SCIENCE, 2020, 21 (01): : 85 - 91
  • [43] Finite key analysis for discrete phase randomized BB84 protocol
    Jin, Xiao-Hang
    Yin, Zhen-Qiang
    Wang, Shuang
    Chen, Wei
    Guo, Guang-Can
    Han, Zheng-Fu
    QUANTUM INFORMATION PROCESSING, 2024, 23 (09)
  • [44] Dim coherent states as signal states in the BB84 protocol:: Is it secure?
    Lütkenhaus, N
    QUANTUM COMMUNICATION, COMPUTING, AND MEASUREMENT 2, 2000, : 387 - 392
  • [45] Simple analysis of security of the BB84 quantum key distribution protocol
    Hong-Yi Su
    Quantum Information Processing, 2020, 19
  • [46] Simple analysis of security of the BB84 quantum key distribution protocol
    Su, Hong-Yi
    QUANTUM INFORMATION PROCESSING, 2020, 19 (06)
  • [47] Modified BB84 quantum key distribution protocol robust to source imperfections
    Pereira, Margarida
    Currás-Lorenzo, Guillermo
    Navarrete, Álvaro
    Mizutani, Akihiro
    Kato, Go
    Curty, Marcos
    Tamaki, Kiyoshi
    arXiv, 2022,
  • [48] How decoherence affects the security of BB84 quantum key distribution protocol
    Okula, Robert
    Mironowicz, Piotr
    QUANTUM INFORMATION PROCESSING, 2025, 24 (02)
  • [49] Estimating Interception Density in the BB84 Protocol: A Study with a Noisy Quantum Simulator
    Fiorini, Francesco
    Pagano, Michele
    Garroppo, Rosario Giuseppe
    Osele, Antonio
    FUTURE INTERNET, 2024, 16 (08)
  • [50] Optimization of coherent attacks in generalizations of the BB84 quantum bit commitment protocol
    Spekkens, RW
    Rudolph, T
    QUANTUM INFORMATION & COMPUTATION, 2002, 2 (01) : 66 - 96