On the Breidbart eavesdropping problem of the extended BB84 QKD protocol

被引:12
|
作者
Yang, L [1 ]
Wu, LA
Liu, SH
机构
[1] Chinese Acad Sci, Grad Sch, State Key Lab Informat Secur, Beijing 100039, Peoples R China
[2] Chinese Acad Sci, Inst Phys, Beijing 100080, Peoples R China
[3] Huanan Normal Univ, Inst Quantum Elect, Guangzhou 510631, Peoples R China
关键词
quantum cryptography; BB84; protocol; Breidbart eavesdropping;
D O I
10.7498/aps.51.961
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
We discuss the Breidbart eavesdropping scheme of the extended BB84 quantum key distribution protocol. Calculation of the effective average Alice/Eve mutual information after performing a standard error-correction under various intercept/resend strategies shows that the Breidbart eavesdropping/Breidbart resend strategy (B/B strategy) is the most effective one. Sine Alice and Bob can test openly whether there is the B/B eavesdropping by making use of the rejected data, we suggest an amendment of the BB84 protocol to reduce the requirements of the privacy amplification algorithm and hence reduce the quantum key loss. Finally, we present a quantum key regeneration method for error-correction which may be more secure than the standard error-correction process.
引用
收藏
页码:961 / 965
页数:5
相关论文
共 11 条
  • [1] Incoherent and coherent eavesdropping in the six-state protocol of quantum cryptography
    Bechmann-Pasquinucci, H
    Gisin, N
    [J]. PHYSICAL REVIEW A, 1999, 59 (06): : 4238 - 4248
  • [2] Bennett C. H., 1992, Journal of Cryptology, V5, P3, DOI 10.1007/BF00191318
  • [3] Bennett C. H., 1984, PROC IEEE INT C COMP, P175, DOI [DOI 10.1016/J.TCS.2014.05.025, 10.1016/j.tcs.2014.05.025]
  • [4] QUANTUM CRYPTOGRAPHY USING ANY 2 NONORTHOGONAL STATES
    BENNETT, CH
    [J]. PHYSICAL REVIEW LETTERS, 1992, 68 (21) : 3121 - 3124
  • [5] BRASSARD G, 1993, EUROCRYPT 93 LOFTH N
  • [6] Optimal eavesdropping in quantum cryptography with six states
    Bruss, D
    [J]. PHYSICAL REVIEW LETTERS, 1998, 81 (14) : 3018 - 3021
  • [7] EAVESDROPPING ON QUANTUM-CRYPTOGRAPHICAL SYSTEMS
    EKERT, AK
    HUTTNER, B
    PALMA, GM
    PERES, A
    [J]. PHYSICAL REVIEW A, 1994, 50 (02): : 1047 - 1056
  • [8] QUANTUM CRYPTOGRAPHY BASED ON BELL THEOREM
    EKERT, AK
    [J]. PHYSICAL REVIEW LETTERS, 1991, 67 (06) : 661 - 663
  • [9] HWANG WY, QUANTPH0009006
  • [10] Quantum key distribution over 1.1km in an 850nm experimental all-fiber system
    Liang, C
    Fu, DH
    Liang, B
    Liao, J
    Wu, LA
    Yao, DC
    Lu, SW
    [J]. ACTA PHYSICA SINICA, 2001, 50 (08) : 1429 - 1433