Security of the Bennett-Brassard quantum key distribution protocol against collective attacks (Q1662481): Difference between revisions
From MaRDI portal
Set OpenAlex properties. |
Normalize DOI. |
||
(One intermediate revision by one other user not shown) | |||
Property / DOI | |||
Property / DOI: 10.3390/a2020790 / rank | |||
Property / cites work | |||
Property / cites work: Quantum cryptography: public key distribution and coin tossing / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Security of quantum key distribution against all collective attacks / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: A proof of the security of quantum key distribution / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Unconditional security in quantum cryptography / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: NOISE TOLERANCE OF THE BB84 PROTOCOL WITH RANDOM PRIVACY AMPLIFICATION / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Probability Inequalities for Sums of Bounded Random Variables / rank | |||
Normal rank | |||
Property / DOI | |||
Property / DOI: 10.3390/A2020790 / rank | |||
Normal rank |
Latest revision as of 01:52, 11 December 2024
scientific article
Language | Label | Description | Also known as |
---|---|---|---|
English | Security of the Bennett-Brassard quantum key distribution protocol against collective attacks |
scientific article |
Statements
Security of the Bennett-Brassard quantum key distribution protocol against collective attacks (English)
0 references
20 August 2018
0 references
Summary: The theoretical Quantum Key-Distribution scheme of \textit{C. H. Bennett} and \textit{G. Brassard} (BB84) [Theor. Comput. Sci. 560, Part 1, 7--11 (2014; Zbl 1306.81030) (revised reprint)] has been proven secure against very strong attacks including the collective attacks and the joint attacks. Though the latter are the most general attacks, collective attacks are much easier to analyze, yet, they are conjectured to be as informative to the eavesdropper. Thus, collective attacks are likely to be useful in the analysis of many theoretical and practical schemes that are still lacking a proof of security, including practical BB84 schemes. We show how powerful tools developed in previous works for proving security against the joint attack, are simplified when applied to the security of BB84 against collective attacks whilst providing the same bounds on leaked information and the same error threshold.
0 references
quantum key distribution (QKD)
0 references
security
0 references
collective attacks
0 references
error-rate threshold
0 references