Applying Multi-Parity Code To The Quantum Security Protocol BB84 Under Different Types Of Attacks-ENG
نویسندگان
چکیده
منابع مشابه
Attacks of BB84 protocol in quantum cryptography
An optimal eavesdropping strategy for BB84 protocol in quantum cryptography is proposed. This scheme is based on the ‘indirect copying’. Under this scheme, eavesdropper can exactly obtain the exchanged information between the legitimate users without being detected.
متن کاملOptimization of coherent attacks in generalizations of the BB84 quantum bit commitment protocol
It is well known that no quantum bit commitment protocol is unconditionally secure. Nonetheless, there can be non-trivial upper bounds on both Bob’s probability of correctly estimating Alice’s commitment and Alice’s probability of successfully unveiling whatever bit she desires. In this paper, we seek to determine these bounds for generalizations of the BB84 bit commitment protocol. In such pro...
متن کاملSecurity Against Collective Attacks of a Modified BB84 QKD Protocol with Information only in One Basis
The Quantum Key Distribution (QKD) protocol BB84 has been proven secure against several important types of attacks: the collective attacks and the joint attacks. Here we analyze the security of a modified BB84 protocol, for which information is sent only in the z basis while testing is done in both the z and the x bases, against collective attacks. The proof follows the framework of a previous ...
متن کاملQuantum Cryptography : On the Security of the BB84 Key-Exchange Protocol
In 1984, C.H. Bennet and G. Brassard proposed a new protocol aimed to solve the problem of symmetric cryptographic key exchange. This protocol was called BB84 after the name of its authors. While a traditional method would rely on public key cryptography (like RSA), the BB84 protocol takes benefit of the laws of quantum mechanics, like for example the fact that any quantum measurement can pertu...
متن کاملSimple proof of security of the BB84 quantum key distribution protocol
We prove that the 1984 protocol of Bennett and Brassard (BB84) for quantum key distribution is secure. We first give a key distribution protocol based on entanglement purification, which can be proven secure using methods from Lo and Chau's proof of security for a similar protocol. We then show that the security of this protocol implies the security of BB84. The entanglement purification based ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: AL-Rafdain Engineering Journal (AREJ)
سال: 2013
ISSN: 2220-1270
DOI: 10.33899/rengj.2013.79569