BB84 PROTOCOL AS A PROTOCOL FOR QUANTUM KEY DISTRIBUTION (QKD).
Authors: Giorgi Labadze
Affiliation: Georgian Technical University
Keywords: quantum key, secret key
ABSTRACT. The publication of the BB84 protocol by Bennett and Brassard in 1984 marks the beginning of quantum key distribution. Since then, many other protocols have been invented. Yet, BB84 keeps a privileged place in the list of existing protocols: it is the one of the most analyzed and most often implemented, including those used in commercial products. We offer the analysis of BB84 protocol. The physical implementation of the protocol is investigated. Finally, we analyze the eavesdropping strategies against BB84 and deduce the secret key rate.
1.Li, HW., Yin, ZQ., Wang, S. et al. Randomness determines practical security of BB84 quantum key distribution. Sci Rep 5, 16200 (2015). https://doi.org/10.1038/srep16200
2.Zhizhong Yan, Evan Meyer-Scott, Jean-Philippe Bourgoin, Brendon L. Higgins, Nikolay Gigov, Allison MacDonald, Hannes Hübel, and Thomas Jennewein, "Novel High-Speed Polarization Source for Decoy-State BB84 Quantum Key Distribution Over Free Space and Satellite Links," J. Lightwave Technol. 31, 1399-1408 (2013)
3.Chen, F.-L.; Wang, Z.-H.; Hu, Y.-M. A New Quantum Blind Signature Scheme with BB84-State. Entropy 2019, 21, 336. https://doi.org/10.3390/e21040336
4.S. Gnatyuk, T. Okhrimenko, M. Iavich and R. Berdibayev, "Intruder Control Mode Simulation of Deterministic Quantum Cryptography Protocol for Depolarized Quantum Channel," 2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T), 2019, pp. 825-828, doi: 10.1109/PICST47496.2019.9061293.
5.Hu, S. Gnatyuk, T. Okhrimenko, V. Kinzeryavyy, M. Iavich, Kh. Yubuzova, High-Speed Privaсy Amplification Method for Deterministic Quantum Cryptography Protocols Using Pairs of Entangled Qutrits, CEUR Workshop Proceedings, Vol. 2393, pp. 810-821, 2019.
6.J. Huang, Y. Wang, H. Wang, Z. Li and J. Huang, "Man-in-the-middle attack on BB84 protocol and its defence," 2009 2nd IEEE International Conference on Computer Science and Information Technology, 2009, pp. 438-439, doi: 10.1109/ICCSIT.2009.5234678.