Javascript must be enabled to continue!
Finite Key Analysis for Discrete Phase Randomized BB84 Protocol
View through CrossRef
Abstract
Quantum key distribution (QKD) is a secure communication method that relies on the inherent randomness of quantum mechanics to ensure information-theoretic security. The first and most widely used QKD protocol is BB84, and the proof of BB84's security is vital. The Discrete Phase Randomized BB84 protocol is a variant of the decoy BB84 protocol. It has been proven to be promising in the development of high-speed QKD systems. However, it still lacks an analysis with a finite number of pulses. This paper presents a comprehensive security analysis of the discrete phase BB84 protocol, using two different methods under different conditions. The analysis involves simulations and optimizations to determine the optimal parameter settings. It is confirmed that for typical scenarios, if the number of discrete phases exceeds 30, one can calculate the key rate by assuming that a continuous phase randomization process was in operation. On the other hand, for a relatively smaller number of discrete values, we have developed a numerical method to calculate the key rate. We have confirmed that its performance is reduced but still acceptable with a finite number of pulses.
Springer Science and Business Media LLC
Title: Finite Key Analysis for Discrete Phase Randomized BB84 Protocol
Description:
Abstract
Quantum key distribution (QKD) is a secure communication method that relies on the inherent randomness of quantum mechanics to ensure information-theoretic security.
The first and most widely used QKD protocol is BB84, and the proof of BB84's security is vital.
The Discrete Phase Randomized BB84 protocol is a variant of the decoy BB84 protocol.
It has been proven to be promising in the development of high-speed QKD systems.
However, it still lacks an analysis with a finite number of pulses.
This paper presents a comprehensive security analysis of the discrete phase BB84 protocol, using two different methods under different conditions.
The analysis involves simulations and optimizations to determine the optimal parameter settings.
It is confirmed that for typical scenarios, if the number of discrete phases exceeds 30, one can calculate the key rate by assuming that a continuous phase randomization process was in operation.
On the other hand, for a relatively smaller number of discrete values, we have developed a numerical method to calculate the key rate.
We have confirmed that its performance is reduced but still acceptable with a finite number of pulses.
Related Results
A Simulated QKD Protocol Using KCBS Contextuality: Comparison with BB84
A Simulated QKD Protocol Using KCBS Contextuality: Comparison with BB84
This paper presents a detailed theoretical and simulation-based comparison between the BB84 quantum key distribution (QKD) protocol and a proof-of-concept contextuality-based QKD p...
Security of Quantum Key Distribution Protocols
Security of Quantum Key Distribution Protocols
The counter-intuitive features of quantum mechanics make it possible to solve problems and perform tasks that are beyond the abilities of non-quantum (classical) computers and comm...
A Hybrid Cryptosystem based on Latin Square and the Modified BB84 Quantum Key Distribution
A Hybrid Cryptosystem based on Latin Square and the Modified BB84 Quantum Key Distribution
A new algorithm to improve the security of the transmitted data over the communication channels is presented in this paper. This algorithm is combining Latin square with the modifi...
Enhanced BB84 Quantum Key Distribution Protocol with Index-Based Qubit Tagging and Correction Method
Enhanced BB84 Quantum Key Distribution Protocol with Index-Based Qubit Tagging and Correction Method
Quantum Key Distribution (QKD) leverages quantum mechanical principles to establish information-theoretically secure cryptographic keys. The cornerstone BB84 protocol, however, suf...
Efficacy and Safety of Subcutaneous Prophylaxis with Concizumab in Patients with Hemophilia a or B with Inhibitors: Results from explorer4, a Phase 2, Randomized, Open-Label, Controlled Trial
Efficacy and Safety of Subcutaneous Prophylaxis with Concizumab in Patients with Hemophilia a or B with Inhibitors: Results from explorer4, a Phase 2, Randomized, Open-Label, Controlled Trial
Introduction Concizumab is an anti-tissue factor pathway inhibitor (TFPI) monoclonal antibody in clinical development for the subcutaneous prophylactic treatment of hemophilia pati...
Children’s Discrete Proportional Reasoning Is Related to Inhibitory Control and Enhanced by Priming Continuous Representations
Children’s Discrete Proportional Reasoning Is Related to Inhibitory Control and Enhanced by Priming Continuous Representations
Children can successfully compare continuous proportions as early as age 4, yet struggle to compare discrete proportions least to age 10, especially when the discrete information i...
Quantum key distribution secure threshold based on BB84 protocol
Quantum key distribution secure threshold based on BB84 protocol
Quantum state in the channel is affected by several factors, which will bring detection error and make secure threshold of quantum distribution protocol unable to judge whether eav...
A New Mathematical Model for EOR Displacements Honouring Oil Ganglia
A New Mathematical Model for EOR Displacements Honouring Oil Ganglia
Abstract
During two-phase flow in porous media non-wetting phase is present simultaneously in states of mobile connected continuum and of trapped isolated ganglia...

