Information leakage via side channels in freespace BB84 quantum cryptography

被引:86
|
作者
Nauerth, Sebastian [1 ]
Fuerst, Martin [1 ]
Schmitt-Manderbach, Tobias [1 ,2 ]
Weier, Henning [1 ]
Weinfurter, Harald [1 ,2 ]
机构
[1] Univ Munich, Dept Phys, D-80799 Munich, Germany
[2] Max Planck Inst Quantum Opt, D-85748 Garching, Germany
来源
NEW JOURNAL OF PHYSICS | 2009年 / 11卷
关键词
KEY DISTRIBUTION;
D O I
10.1088/1367-2630/11/6/065001
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
While the BB84 protocol is in principle secure, real implementations suffer from imperfections. Here, we analyse a free space BB84 transmitter, operating with polarization encoded attenuated pulses. We report on measurements of all degrees of freedom of the transmitted photons in order to estimate potential side channels of the state preparation at Alice.
引用
收藏
页数:8
相关论文
共 50 条
  • [31] PRACTICAL QUANTUM KEY AGREEMENT PROTOCOL BASED ON BB84
    Wang, Ping
    Zhang, R.
    Sun, Zhiwei
    QUANTUM INFORMATION & COMPUTATION, 2022, 22 (3-4) : 241 - 250
  • [32] Simulation of BB84 and proposed protocol for quantum key distribution
    Kalra, Manish
    Poonia, Ramesh C.
    JOURNAL OF STATISTICS & MANAGEMENT SYSTEMS, 2018, 21 (04): : 661 - 666
  • [33] Simulation of BB84 Quantum Key Distribution in depolarizing channel
    Qiao, Hui
    Chen, Xiao-yu
    PROCEEDINGS OF THE 14TH YOUTH CONFERENCE ON COMMUNICATION, 2009, : 483 - 487
  • [34] Implementation of BB84 Quantum Key Distribution using OptSim
    Archana, B.
    Krithika, S.
    2015 2ND INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYSTEMS (ICECS), 2015, : 457 - 460
  • [35] Simulation Study of Single Quantum Channel BB84 Quantum Key Distribution
    Foong, Oi-Mean
    Low, Tang Jung
    Hong, Kah Wing
    IT CONVERGENCE AND SECURITY 2017, VOL 2, 2018, 450 : 159 - 167
  • [36] Simulation of BB84 Quantum Key Exchange Protocol and Attack Analysis
    Adiyaman, Ilker Burak
    Sogukpinar, Ibrahim
    2020 5TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), 2020, : 203 - 207
  • [37] Quantum scheme for an optimal attack on quantum key distribution protocol BB84
    Kronberg D.A.
    Molotkov S.N.
    Bulletin of the Russian Academy of Sciences: Physics, 2010, 74 (7) : 912 - 918
  • [38] Quantum key distribution secure threshold based on BB84 protocol
    Zhao Nan
    Pei Chang-Xing
    Liu Dan
    Quan Dong-Xiao
    Sun Xiao-Nan
    ACTA PHYSICA SINICA, 2011, 60 (09)
  • [39] Randomness determines practical security of BB84 quantum key distribution
    Hong-Wei Li
    Zhen-Qiang Yin
    Shuang Wang
    Yong-Jun Qian
    Wei Chen
    Guang-Can Guo
    Zheng-Fu Han
    Scientific Reports, 5
  • [40] Simple proof of security of the BB84 quantum key distribution protocol
    Shor, PW
    Preskill, J
    PHYSICAL REVIEW LETTERS, 2000, 85 (02) : 441 - 444