Enhancement of Error Correction in Quantum Cryptography BB84 Protocol
نویسندگان
چکیده
The Quantum Cryptography BB84 protocol has proved to be quite successful in the process of Quantum Key Distribution (QKD). The protocol is used to create a secure key that is shared between two communicating parties. A major phase in this protocol is the correction of errors and discrepancies between keys of sender and receiver. The present work is concerned with enhancing the error correction phase in such protocol so that the keys generated would be created more efficiently; i.e., to enable the creation of longer shared keys in less time. For this purpose, we have introduced an algorithm based on the use of a memory structure between rounds of the error correction phase. The advantages of the algorithm presented in this paper are established using simulated experiments. A performance evaluation parameter is computed as the ratio of key length to the total operations needed to reach it. This value needs to be maximized for best performance. The experimental results have been compared through a parameterization model assuming that the relative increase in evaluation is linear in the block size increment. Parameters deduced from the experiments show that the performance of the enhanced algorithm is better by a factor of approximately 1.7 – 3.1 relative to the standard algorithm for initial block sizes ≥ 0.5 % of the key length, and by a factor of 1.15 – 1.30 for initial block sizes < 0.5 % of the key length.
منابع مشابه
On the optimality of individual entangling-probe attacks against BB84 quantum key distribution
Some MIT researchers [Phys. Rev. A 75, 042327 (2007)] have recently claimed that their implementation of the Slutsky-Brandt attack [Phys. Rev. A 57, 2383 (1998); Phys. Rev. A 71, 042312 (2005)] to the BB84 quantum-key-distribution (QKD) protocol puts the security of this protocol “to the test” by simulating “the most powerful individual-photon attack” [Phys. Rev. A 73, 012315 (2006)]. A related...
متن کاملAn introduction to quantum error correction
Communication at high speeds, long distances, and in unknown environments often requires combatting noise that may affect or destroy data before it has reached its intended destination. When designing robust, practical communication systems, it is important to take such effects into account and engineer a system to be as immune to noise as possible. Classical communications often relies upon va...
متن کاملProof of security of quantum key distribution with two-way classical communications
Shor and Preskill have provided a simple proof of security of the standard quantum key distribution scheme by Bennett and Brassard (BB84) by demonstrating a connection between key distribution and entanglement purification protocols with one-way communications. Here we provide proofs of security of standard quantum key distribution schemes, BB84 and the six-state scheme, against the most genera...
متن کاملnt - p h / 01 01 09 8 v 2 1 8 Se p 20 01 Quantum cryptography
II A beautiful idea 2 A The intuition . . . . . . . . . . . . . . . 2 B Classical cryptography . . . . . . . . . 3 1 Asymmetrical (public-key) cryptosystems . . . . . . . . . . . . . . . 3 2 Symmetrical (secret-key) cryptosystems . . . . . . . . . . . . . . . . . 4 3 The one-time-pad as “classical teleportation” . . . . . . . . . . . . . . 5 C The example of the BB84 protocol . . . 5 1 Principl...
متن کاملRaw-data Attacks in Quantum Cryptography with Partial Tomography
We consider a variant of the BB84 protocol for quantum cryptography, the prototype of tomographically incomplete protocols, where the key is generated by one-way communication rather than the usual two-way communication. Our analysis, backed by numerical evidence, establishes thresholds for eavesdropping attacks on the raw data and on the generated key at quantum bit error rates of 10% and 6.15...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Egyptian Computer Science Journal
دوره 31 شماره
صفحات -
تاریخ انتشار 2009