Security of the Bennett-Brassard quantum key distribution protocol against collective attacks (Q1662481): Difference between revisions

From MaRDI portal
Set OpenAlex properties.
ReferenceBot (talk | contribs)
Changed an Item
Property / cites work
 
Property / cites work: Quantum cryptography: public key distribution and coin tossing / rank
 
Normal rank
Property / cites work
 
Property / cites work: Security of quantum key distribution against all collective attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: A proof of the security of quantum key distribution / rank
 
Normal rank
Property / cites work
 
Property / cites work: Unconditional security in quantum cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: NOISE TOLERANCE OF THE BB84 PROTOCOL WITH RANDOM PRIVACY AMPLIFICATION / rank
 
Normal rank
Property / cites work
 
Property / cites work: Probability Inequalities for Sums of Bounded Random Variables / rank
 
Normal rank

Revision as of 09:19, 16 July 2024

scientific article
Language Label Description Also known as
English
Security of the Bennett-Brassard quantum key distribution protocol against collective attacks
scientific article

    Statements

    Security of the Bennett-Brassard quantum key distribution protocol against collective attacks (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    20 August 2018
    0 references
    Summary: The theoretical Quantum Key-Distribution scheme of \textit{C. H. Bennett} and \textit{G. Brassard} (BB84) [Theor. Comput. Sci. 560, Part 1, 7--11 (2014; Zbl 1306.81030) (revised reprint)] has been proven secure against very strong attacks including the collective attacks and the joint attacks. Though the latter are the most general attacks, collective attacks are much easier to analyze, yet, they are conjectured to be as informative to the eavesdropper. Thus, collective attacks are likely to be useful in the analysis of many theoretical and practical schemes that are still lacking a proof of security, including practical BB84 schemes. We show how powerful tools developed in previous works for proving security against the joint attack, are simplified when applied to the security of BB84 against collective attacks whilst providing the same bounds on leaked information and the same error threshold.
    0 references
    quantum key distribution (QKD)
    0 references
    security
    0 references
    collective attacks
    0 references
    error-rate threshold
    0 references

    Identifiers