Simple proof of the unconditional security of the Bennett 1992 quantum key distribution protocol

被引:50
|
作者
Zhang, Q [1 ]
Tang, CJ [1 ]
机构
[1] Natl Univ Deference Technol, Sch Elect Sci & Technol, Changsha 410073, Peoples R China
来源
PHYSICAL REVIEW A | 2002年 / 65卷 / 06期
关键词
D O I
10.1103/PhysRevA.65.062301
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
It is generally accepted that quantum key distribution (QKD) could supply legitimate users with unconditional security during their communication. Quite a lot of satisfactory efforts have been achieved on experimentations with quantum cryptography. However, when the eavesdropper has extra-powerful computational ability, has access to a quantum computer, for example, and can carry into execution any eavesdropping measurement that is allowed by the laws of physics, the security against such attacks has not been widely studied and rigorously proved for most QKD protocols. Quite recently, Shor and Preskill proved concisely the unconditional security of the Bennett-Brassard 1984 (BB84) protocol. Their method is highly valued for its clarity of concept and concision of form. In order to take advantage of the Shor-Preskill technique in their proof of the unconditional security of the BB84 QKD protocol, we introduced in this paper a transformation that can translate the Bennett 1992 (B92) protocol into the BB84 protocol. By proving that the transformation leaks no more information to the eavesdropper, we proved the unconditional security of the B92 protocol. We also settled the problem proposed by Lo about how to prove the unconditional security of the B92 protocol with the Shor-Preskill method.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] Unconditional security of practical quantum key distribution
    H. Inamori
    N. Lütkenhaus
    D. Mayers
    The European Physical Journal D, 2007, 41
  • [22] Unconditional security of practical quantum key distribution
    Inamori, H.
    Lutkenhaus, N.
    Mayers, D.
    EUROPEAN PHYSICAL JOURNAL D, 2007, 41 (03): : 599 - 627
  • [23] Finite-size key in the Bennett 1992 quantum-key-distribution protocol for Renyi entropies
    Mafu, Mhlambululi
    Garapo, Kevin
    Petruccione, Francesco
    PHYSICAL REVIEW A, 2013, 88 (06):
  • [24] Security Proof of Quantum Key Distribution
    Tamaki, Kiyoshi
    Tsurumaru, Toyohiro
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2010, E93A (05) : 880 - 888
  • [25] A Proof of the Security of Quantum Key Distribution
    Eli Biham
    Michel Boyer
    P. Oscar Boykin
    Tal Mor
    Vwani Roychowdhury
    Journal of Cryptology, 2006, 19 : 381 - 439
  • [26] A proof of the security of quantum key distribution
    Biham, Eli
    Boyer, Michel
    Boykin, P. Oscar
    Mor, Tal
    Roychowdhury, Vwani
    JOURNAL OF CRYPTOLOGY, 2006, 19 (04) : 381 - 439
  • [27] Shor-Preskill-type security proof for concatenated Bennett-Brassard 1984 quantum-key-distribution protocol
    Hwang, WY
    Matsumoto, K
    Imai, H
    Kim, J
    Lee, HW
    PHYSICAL REVIEW A, 2003, 67 (02):
  • [28] Unconditional security of quantum key distribution and the uncertainty principle
    Koashi, Masato
    12TH CENTRAL EUROPEAN WORKSHOP ON QUANTUM OPTICS, 2006, 36 : 98 - 102
  • [29] Security of the Bennett-Brassard Quantum Key Distribution Protocol against Collective Attacks
    Boyer, Michel
    Gelles, Ran
    Mor, Tal
    ALGORITHMS, 2009, 2 (02): : 790 - 807
  • [30] Proof of Security of a Semi-Device-Independent Quantum Key Distribution Protocol
    Xu, Peng
    Bao, Wan-Su
    Li, Hong-Wei
    Wang, Yang
    Bao, Hai-Ze
    CHINESE PHYSICS LETTERS, 2017, 34 (02)