Simulating BB84 Protocol in Dephasing Qubit Channel
نویسنده
چکیده
BB84 protocol of quantum key distribution had been proved to be absolutely secure. We simulate the rate of secure key distribution in dephasing channel on a classical computer with the method of event-by-event simulation. Theoretically, the private classical capacity of dephasing channel can be obtained in principle, since the channel is degradable. We give the formula of capacity with respect to the dephasing coefficient. The simulation meets the theory well.
منابع مشابه
Secure Communication Using Qubits
A two-layer quantum protocol for secure transmission of data using qubits is presented. The protocol is an improvement over the BB84 QKD protocol. BB84, in conjunction with the one-time pad algorithm, has been shown to be unconditionally secure. However it suffers from two drawbacks: (1) Its security relies on the assumption that Alice’s qubit source is perfect in the sense that it does not ina...
متن کاملA Three-Stage Quantum Cryptography Protocol
We present a three-stage quantum cryptographic protocol based on public key cryptography in which each party uses its own secret key. Unlike the BB84 protocol, where the qubits are transmitted in only one direction and classical information exchanged thereafter, the communication in the proposed protocol remains quantum in each stage. A related system of key distribution is also described. Intr...
متن کاملSecurity proof of a three-state quantum key distribution protocol without rotational symmetry
Standard security proofs of quantum key distribution (QKD) protocols often rely on symmetry arguments. In this paper, we prove the security of a three-state protocol that does not possess rotational symmetry. The three-state QKD protocol we consider involves three qubit states, where the first two states, |0z〉 and |1z〉, can contribute to key generation and the third state, |+〉 = (|0z〉 + |1z〉)/ ...
متن کاملKey Rate Available from Mismatched Mesurements in the BB 84 Protocol and the Uncertainty Principle ∗
SUMMARY We consider the mismatched measurements in the BB84 quantum key distribution protocol, in which measuring bases are different from transmitting bases. We give a lower bound on the amount of a secret key that can be extracted from the mismatched measurements. Our lower bound shows that we can extract a secret key from the mismatched measurements with certain quantum channels, such as the...
متن کاملEavesdropping in semiquantum key distribution protocol
The quantum key distribution protocol with classical Bob, well known as semiquantum key distribution, has been proposed a few years back (Boyer et al., PRL 2007, PRA 2009). In this protocol Alice has the same capability as in the traditional BB84 protocol, but Bob is limited by the constraint that he can measure or prepare qubits only in {|0〉, |1〉} basis and reflect any other qubit (or in other...
متن کامل