|
- Quantum Cyber Security Lecture 9: Other QKD and similar protocols
Difference to BB84: Uses states from three orthogonal bases { , , } (thus six-states) rather than two bases (four-states) Information Reconciliation (IR) and Privacy Amplification (PA) exactly as in BB84 The ideas for the security proof of this protocol are same as BB84
- Analysis of BB84 and Six-State Protocols - WordPress. com
The BB84 [BB84] and six-state [Bru98,BPG99] protocols are prepare-and-measure quantum key distribution (QKD) protocols in which Alice and Bob make use of states and measurements from mutually unbiased bases in order to distill a secret key
- Quantum Key Distribution and BB84 Protocol - Medium
SSP99 Protocol: The six-state protocol was proposed by Pasquinucci and Gisin in 1999 Instead of two orthogonal bases, it uses six orthogonal bases to encode the bits, which results in a lower
- Security of six-state quantum key distribution protocol with . . .
Our work exploit the existence of the squash operator for the six-state protocol up to two photons as well as the one for BB84 while the work in the paper 14 demonstrates a universal idea
- List of quantum key distribution protocols - Wikipedia
Six-state protocol (1998) is a method of transmitting secure information using quantum cryptography that is more resistant to noise and easier to detect errors in compared to the BB84 protocol, due to its use of a six-state polarization scheme on three orthogonal bases and its ability to tolerate a noisier channel
- Proof of security of quantum key distribution with two-way . . .
In particular, for both BB84 and the six-state scheme, our protocol tolerates a higher bit error rate than any one-way 2 Mayers’ and Shor–Preskill’s proofs make different assumptions
- Proof of unconditional security of six-state quatum key . . .
This shows a clear advantage of the six-state scheme over another standard scheme---BB84, which has been proven to be secure up to only about 11 percents, if only one-way classical communications
|
|
|