BB84

BB84

BB84 is a quantum key distribution scheme developed by Charles Bennett and Gilles Brassard in 1984. It is the first quantum cryptography protocol. [http://arxiv.org/abs/quant-ph/0505035] The protocol is provably secure, relying on the quantum property that information gain is only possible at the expense of disturbing the signal if the two states we are trying to distinguish are not orthogonal (see no cloning theorem). It is usually explained as a method of securely communicating a private key from one party to another for use in one-time pad encryption.

Description

In the BB84 scheme, Alice wishes to send a private key to Bob. She begins with two strings of bits, a and b, each n bits long. She then encodes these two strings as a string of n qubits,

|psi angle = igotimes_{i=1}^{n}|psi_{a_ib_i} angle.

a_i and b_i are the i^mathrm{th} bits of a and b, respectively. Together, a_ib_i give us an index into the following four qubit states:

|psi_{00} angle = |0 angle

|psi_{10} angle = |1 angle

|psi_{01} angle = |+ angle = frac{1}{sqrt{2|0 angle + frac{1}{sqrt{2|1 angle

|psi_{11} angle = |- angle = frac{1}{sqrt{2|0 angle - frac{1}{sqrt{2|1 angle.

Note that the bit b_i is what decides which basis a_i is encoded in (either in the computational basis or the Hadamard basis). The qubits are now in states which are not mutually orthogonal, and thus it is impossible to distinguish all of them with certainty without knowing b.

Alice sends |psi angle over a public quantum channel to Bob. Bob receives a state varepsilon ho = varepsilon|psi anglelanglepsi|, where varepsilon represents the effects of noise in the channel as well as eavesdropping by a third party we'll call Eve. After Bob receives the string of qubits, all three parties, namely Alice, Bob and Eve, have their own states. However, since only Alice knows b, it makes it virtually impossible for either Bob or Eve to distinguish the states of the qubits. Also, after Bob has received the qubits, we know that Eve cannot be in possession of a copy of the qubits sent to Bob, by the no cloning theorem, unless she has made measurements. Her measurements, however, risk disturbing a particular qubit with probability ½ if she guesses the wrong basis.

Bob proceeds to generate a string of random bits b' of the same length as b, and then measures the string he has received from Alice, a'. At this point, Bob announces publicly that he has received Alice's transmission. Alice then knows she can now safely announce b. Bob communicates over a public channel with Alice to determine which b_i and b'_i are not equal. Both Alice and Bob now discard the qubits in a and a' where b and b' do not match.

From the remaining k bits where both Alice and Bob measured in the same basis, Alice randomly chooses k/2 bits and discloses her choices over the public channel. Both Alice and Bob announce these bits publicly and run a check to see if more than a certain number of them agree. If this check passes, Alice and Bob proceed to use information reconciliation and privacy amplification techniques to create some number of shared secret keys. Otherwise, they cancel and start over.

See also

* SARG04

References

* "Quantum Computing and Quantum Information", Michael Nielsen and Isaac Chuang


Wikimedia Foundation. 2010.

Игры ⚽ Нужно сделать НИР?

Look at other dictionaries:

  • BB84 — BB84  первый протокол квантового распределения ключа, который был предложен в 1984 году Чарльзом Беннетом и Жилем Брассардом. Отсюда и название BB84, под которым этот протокол известен в наше время. Носителями информации являются 2 х… …   Википедия

  • Quantum cryptography — Quantum cryptography, or quantum key distribution (QKD), uses quantum mechanics to guarantee secure communication. It enables two parties to produce a shared random bit string known only to them, which can be used as a key to encrypt and decrypt… …   Wikipedia

  • Quanten-Kryptographie — Als Quantenkryptografie oder Quanten Schlüsselaustausch bezeichnet man mehrere Verfahren der Quanteninformatik. Sie nutzen Eigenschaften der Quantenmechanik, um zwei Parteien eine gemeinsame Zufallszahl zur Verfügung zu stellen. Diese Zahl wird… …   Deutsch Wikipedia

  • Quantenkryptografie — Als Quantenkryptografie oder Quanten Schlüsselaustausch bezeichnet man mehrere Verfahren der Quanteninformatik. Sie nutzen Eigenschaften der Quantenmechanik, um zwei Parteien eine gemeinsame Zufallszahl zur Verfügung zu stellen. Diese Zahl wird… …   Deutsch Wikipedia

  • Quantenkryptographie — Als Quantenkryptografie oder Quanten Schlüsselaustausch bezeichnet man mehrere Verfahren der Quanteninformatik. Sie nutzen Eigenschaften der Quantenmechanik, um zwei Parteien eine gemeinsame Zufallszahl zur Verfügung zu stellen. Diese Zahl wird… …   Deutsch Wikipedia

  • Quantenverschlüsselung — Als Quantenkryptografie oder Quanten Schlüsselaustausch bezeichnet man mehrere Verfahren der Quanteninformatik. Sie nutzen Eigenschaften der Quantenmechanik, um zwei Parteien eine gemeinsame Zufallszahl zur Verfügung zu stellen. Diese Zahl wird… …   Deutsch Wikipedia

  • SARG04 — is a quantum cryptography protocol derived from the first protocol of that kind, BB84.OriginResearchers built SARG04 when they noticed that by using the four states of BB84 with a different information encoding they could develop a new protocol… …   Wikipedia

  • Criptografía cuántica — Saltar a navegación, búsqueda La criptografía cuántica es la criptografía que utiliza principios de la mecánica cuántica para garantizar la absoluta confidencialidad de la información transmitida. Las actuales técnicas de la criptografía cuántica …   Wikipedia Español

  • Квантовая криптография — Квантовая криптография  метод защиты коммуникаций, основанный на принципах квантовой физики. В отличие от традиционной криптографии, которая использует математические методы, чтобы обеспечить секретность информации, квантовая криптография… …   Википедия

  • Cryptographie quantique — La cryptographie quantique, plus correctement nommée distribution quantique de clés, désigne un ensemble de protocoles permettant de distribuer une clé de chiffrement secrète entre deux interlocuteurs distants, tout en assurant la sécurité de la… …   Wikipédia en Français

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”