Questions tagged [bb84]

For questions related to quantum cryptography protocol BB84.

BB84 is a quantum key distribution protocol for quantum cryptography invented by Charles Bennett and Gilles Brassard in 1984. It is used for safe random key distribution between two parties. It also allows to detect an eavesdropper trying to catch the key.

The protocol works as follows:

Alice generates a qubit in one of 4 states $\{|1\rangle, |0\rangle, |+\rangle, |-\rangle \}$ and sends it to Bob. The states $|1\rangle$ and $|+\rangle$ mean bit $1$ and the states $|0\rangle$ and $|-\rangle$ mean bit $0$. Upon receiving the qubit Bob measures it in $\{0,1\}$ basis or in $\{-,+\}$ basis, chosen randomly. If Bob measured in say $\{0,1\}$ basis and Alice sent $|0\rangle$ or $|1\rangle$ qubit, then Alice and Bob shared 1 bit of a secret key. What remains is to check that Bob used the right basis. This is done by using an open classical channel, for example Bob sends information which basis he used and Alice replies (also in open) is this basis right or not. If the basis is wrong, the bit is discarded.

More information can be found in the original paper Quantum cryptography: Public key distribution and coin tossing or on Wikipedia.

49 questions
11
votes
1 answer

How many bits do Alice and Bob needs to compare to make sure the channel is secure in BB84?

I was trying to self-study qmc by reading the Quantum Computing A Gentle Introduction book, in section 2.4 it talks about the quantum key distribution protocol BB84. After (I thought) I understood it I went to work on exercise 2.9 and 2.10. Ex. 2.9…
Sam
  • 213
  • 1
  • 7
10
votes
1 answer

What authentication protocol to use for BB84 and other QKD protocols?

Just like other classical and quantum key distribution protocols, BB84 is vulnerable to "man"-in-the-middle attacks, where Eve pretends to be Bob to Alice, and Eve pretends to be Alice to Bob. The countermeasure against this potential…
Bruno Rijsman
  • 353
  • 2
  • 10
5
votes
3 answers

How are eavesdroppers detected when using BB84 in the presence of noise?

I would like to expand upon this question: What is the probability of detecting Eve's tampering, in BB84? Let's say that when the receiver (colloquially referred to as Bob) receives a qubit and measures it in the correct basis, the receiver still…
Quantum Guy 123
  • 1,499
  • 6
  • 20
5
votes
1 answer

Is the BB84 protocol an example of "quantum supremacy"?

This is a fairly broad question, I hope it fits here. I am wondering if the BB84 protocol is an example of "quantum supremacy", ie. something a quantum computer can do but something that is assumed a classical computer cannot do the equivalent of. …
user918212
  • 227
  • 1
  • 4
5
votes
1 answer

In the BB84 protocol, for what error thresholds can Alice and Bob not establish secure bits?

Suppose Alice and Bob can communicate over a quantum channel. The quantum channel is noiseless in the absence of eavesdropping, a condition that cannot be guaranteed. They can also communicate over a classical channel which may be tapped, but not…
Condo
  • 2,196
  • 7
  • 31
4
votes
1 answer

Does the Lieb-Robinson bound constrain the speed of entanglement information transmission?

I just learned from the existence of the theoretical Lieb-Robinson bound, which indicates that the speed at which information can be propagated in non-relativistic quantum systems cannot exceed this upper limit. If this is true, then does it mean…
Clausia
  • 143
  • 3
4
votes
0 answers

Probability of error in BB84 if Eve is using Breidbart's basis

I'm taking a course on quantum cryptography and I have a homework to calculate probability of error in BB84. The task says to assume that Eve uses the Breidbart basis with eigenvectors $$|φ_0⟩ = \cos(π/8)|0⟩ + \sin(π/8)|1⟩, |φ_1⟩ = − \sin(π/8)|0⟩ +…
demonsrun
  • 41
  • 1
4
votes
0 answers

Is there a BB84 "man"-in-the-middle attack forcing the same keys on Alice and Bob known to Eve

Consider the following scenario: Alice and Bob run BB84 to each other. Eavesdropper Eve is present in the middle. Here we assume that she has access to all channels: the quantum channel, in the classical control channel (where the BB84 protocol…
Bruno Rijsman
  • 353
  • 2
  • 10
4
votes
1 answer

Eavesdropping in case of the BB84 Protocol

I try to understand eavesdropping in case of the BB84 protocol (lets assume we have single photons, no noise etc.). Alice and Bob generate a classical random bit $a_i'$ and $b_i'$. Alice generates an encoded quantum bit $a_i$ based on $a_i'$ and…
choc1709
  • 151
  • 1
4
votes
1 answer

Show That an Intercept and Resend Attack on all qubits reduces mutual information

Exercise 5.3.3 With no eavesdropping the mutual information $H(A:B)$ between the substring of $\mathcal R$ held by Alice and $\mathcal R'$ held by Bob is $1$ bit. Show that if Eve is performing an intercept and resend attack on all qubits that she…
Dwye
  • 131
  • 1
3
votes
1 answer

Counting channel uses of the lossy bosonic channel or definition of channel uses

The PLOB-bound ("Fundamental Limits of Repeaterless Quantum Communications") gives an asymptotic upper bound on the secret-key rate per used lossy bosonic channel. However, I'm not sure how to count the number of used channels in a physical…
3
votes
1 answer

BB84 cloning games and state splitting

I have been trying to simulate cloning games for BB84 states with qiskit. The game I am struggling with is as follows, where Alice plays against Bob and Charlie. Alice creates a state $H^{\theta}|x \rangle $, with $x, \theta \in \{0, 1\}$. Alice…
3
votes
1 answer

DOS attacks on QKD Systesm

In the BB84 QKD or similar protocol, we know that eavesdropping or interception during secret key generation can be detected, prompting both parties to discard the transaction and attempt a new one. However, what if, as a hacker, my goal is to…
3
votes
0 answers

Doubt in Shor-Preskill's proof of security proof of BB84

I was going through the proof of security of the modified Lo-Chau protocol, which eventually leads to the proof of security of BB84. In the error correction step, Nielson-Chuang mention that any bipartite state $\rho^{AB}$, with the promise that…
3
votes
0 answers

Mutual information between Alice and Eve in a BB84 intercept resend attack

I'm new to information theory and i need to calculate $I(A,E)$. To calculate it I need conditional entropy $H(A|E)$. I assume the BB84 protocol standard states $\{ |0\rangle,|1\rangle \},\{|+\rangle,|-\rangle\}$. I assume a standard intercept resend…
1
2 3 4