scholarly journals Security analysis of BB84 protocol in the collective-rotation noise channel

2016 ◽  
Vol 65 (3) ◽  
pp. 030302
Author(s):  
Li Jian ◽  
Chen Yan-Hua ◽  
Pan Ze-Shi ◽  
Sun Feng-Qi ◽  
Li Na ◽  
...  
2018 ◽  
Vol 14 (5) ◽  
pp. 155014771877819 ◽  
Author(s):  
Leilei Li ◽  
Hengji Li ◽  
Chaoyang Li ◽  
Xiubo Chen ◽  
Yan Chang ◽  
...  

The bit error in quantum communication is mainly caused by eavesdropping and noise. However, most quantum communication protocols only take eavesdropping into consideration and ignore the result of noise, making the inaccuracy situations in detecting the eavesdropper. To analyze the security of the quantum E91 protocol presented by Ekert in collective-rotation noise channel, an excellent model of noise analysis is proposed. The increment of the qubits error rate (ber) is used to detect eavesdropping. In our analysis, eavesdropper (Eve) can maximally get about 50% of the key from the communication when the noise level approximates to 0.5. The results show that in the collective-rotation noise environment, E91 protocol is secure and the raw key is available just as we have knew and proved. We also presented a new idea in analyzing the protocol security in noise channel.


2019 ◽  
Vol 58 (4) ◽  
pp. 1326-1336
Author(s):  
Leilei Li ◽  
Jian Li ◽  
Chaoyang Li ◽  
Hengji Li ◽  
Yuguang Yang ◽  
...  

2015 ◽  
Vol 24 (4) ◽  
pp. 689-693 ◽  
Author(s):  
Jian Li ◽  
Xinxin Ye ◽  
Kaiguo Yuan ◽  
Jun Zheng ◽  
Zeshi Pan ◽  
...  

Author(s):  
Ming Fang ◽  
Ya-Ping Li ◽  
Li Fei

Quantum key distribution (QKD) allows authenticated parties to share secure keys. Its security comes from quantum physics rather than computational complexity. The previous work has been able to demonstrate the security of the BB84 protocol based on the uncertainty principle, entanglement purification and information theory. In the security proof method based on entanglement purification, it is assumed that the information of Calderbank–Shor–Steane (CSS) error correction code cannot be leaked, otherwise, it is insecure. However, there is no quantitative analysis of the relationship between the parameter of CSS code and the amount of information leaked. In the attack and defense strategy of the actual quantum key distribution system, especially in the application of the device that is easy to lose or out of control, it is necessary to assess the impact of the parameter leakage. In this paper, we derive the relationship between the leaked parameter of CSS code and the amount of the final key leakage based on the BB84 protocol. Based on this formula, we simulated the impact of different CSS code parameter leaks on the final key amount. Through the analysis of simulation results, the security of the BB84 protocol is inversely proportional to the value of [Formula: see text] and [Formula: see text] in the case of the CSS code leak.


2010 ◽  
Vol 08 (08) ◽  
pp. 1389-1395 ◽  
Author(s):  
HAI-KUAN DONG ◽  
LI DONG ◽  
XIAO-MING XIU ◽  
YA-JUN GAO

A deterministic secure quantum communication protocol against collective rotation noise is proposed. If the security check is passed, the receiver can obtain a one-bit secret message with the aid of a one-bit classical message for two photons. It does not need a photon storing technique and only single photon measurement is necessary.


2017 ◽  
Vol 31 (03) ◽  
pp. 1750015 ◽  
Author(s):  
Yefeng He ◽  
Wenping Ma

Based on logical GHZ states and logical Bell states, two robust quantum key agreement protocols are proposed, which can be immune to the collective-dephasing noise and the collective-rotation noise, respectively. The delayed measurement technique ensures that two participants can fairly negotiate a shared key and any one of them cannot successfully perform the participant attacks. The two protocols are congenitally free from the Trojan horse attacks and they can resist against other outsider attacks with the help of the decoy state technology. Moreover, they have no information leakage problem and achieve high qubit efficiency.


2016 ◽  
Vol 30 (25) ◽  
pp. 1650178
Author(s):  
Tian-Yin Wang ◽  
Xiao-Qiu Cai ◽  
Rui-Ling Zhang

We propose two symmetrically-private information retrieval protocols based on quantum key distribution, which provide a good degree of database and user privacy while being flexible, loss-resistant and easily generalized to a large database similar to the precedent works. Furthermore, one protocol is robust to a collective-dephasing noise, and the other is robust to a collective-rotation noise.


Sign in / Sign up

Export Citation Format

Share Document