DeepAI AI Chat
Log In Sign Up

Composable Security Against Collective Attacks of a Modified BB84 QKD Protocol with Information only in One Basis

11/27/2017
by   Michel Boyer, et al.
Technion
Université de Montréal
0

Quantum Cryptography uses the counter-intuitive properties of Quantum Mechanics for performing cryptographic tasks in a secure and reliable way. The Quantum Key Distribution (QKD) protocol BB84 has been proven secure against several important types of attacks: collective attacks and joint attacks. Here we analyze the security of a modified BB84 protocol, for which information is sent only in the z basis while testing is done in both the z and the x bases, against collective attacks. The proof follows the framework of a previous paper (Boyer, Gelles, and Mor, 2009), but it avoids a classical information-theoretical analysis and proves a fully composable security. We show that this modified BB84 protocol is as secure against collective attacks as the original BB84 protocol, and that it requires more bits for testing.

READ FULL TEXT

page 1

page 2

page 3

page 4

12/03/2020

Security Proof Against Collective Attacks for an Experimentally Feasible Semi-Quantum Key Distribution Protocol

Semi-quantum key distribution (SQKD) allows two parties (Alice and Bob) ...
09/27/2019

Upper Bound of Collective Attacks on Quantum Key Distribution

Evaluating the theoretical limit of the amount of information Eve can st...
01/10/2021

Quantum Secure Direct Communication with Mutual Authentication using a Single Basis

In this paper, we propose a new theoretical scheme for quantum secure di...
12/19/2021

Performance analysis of continuous-variable quantum key distribution using non-Gaussian states

In this study, we analyze the efficiency of a protocol with discrete mod...
05/25/2022

Quantum security and theory of decoherence

We sketch a relation between two crucial, yet independent, fields in qua...
01/26/2023

Robust multi-party semi-quantum private comparison protocols with decoherence-free states against collective noises

Based on decoherence-free states, two multi-party semi-quantum private c...
07/01/2020

Dispelling Myths on Superposition Attacks: Formal Security Model and Attack Analyses

It is of folkloric belief that the security of classical cryptographic p...