schliessen

Filtern

 

Bibliotheken

Security of BB84 with weak randomness and imperfect qubit encoding

The main threats for the well-known Bennett–Brassard 1984 (BB84) practical quantum key distribution (QKD) systems are that its encoding is inaccurate and measurement device may be vulnerable to particular attacks. Thus, a general physical model or security proof to tackle these loopholes simultaneou... Full description

Journal Title: Quantum Information Processing 2018, Vol.17(3), pp.1-13
Main Author: Zhao, Liang-Yuan
Other Authors: Yin, Zhen-Qiang , Li, Hong-Wei , Chen, Wei , Fang, Xi , Han, Zheng-Fu , Huang, Wei
Format: Electronic Article Electronic Article
Language: English
Subjects:
ID: ISSN: 1570-0755 ; E-ISSN: 1573-1332 ; DOI: 10.1007/s11128-018-1830-0
Link: http://dx.doi.org/10.1007/s11128-018-1830-0
Zum Text:
SendSend as email Add to Book BagAdd to Book Bag
Staff View
recordid: springer_jour10.1007/s11128-018-1830-0
title: Security of BB84 with weak randomness and imperfect qubit encoding
format: Article
creator:
  • Zhao, Liang-Yuan
  • Yin, Zhen-Qiang
  • Li, Hong-Wei
  • Chen, Wei
  • Fang, Xi
  • Han, Zheng-Fu
  • Huang, Wei
subjects:
  • Quantum key distribution
  • BB84
  • Weak randomness
  • State flaws
ispartof: Quantum Information Processing, 2018, Vol.17(3), pp.1-13
description: The main threats for the well-known Bennett–Brassard 1984 (BB84) practical quantum key distribution (QKD) systems are that its encoding is inaccurate and measurement device may be vulnerable to particular attacks. Thus, a general physical model or security proof to tackle these loopholes simultaneously and quantitatively is highly desired. Here we give a framework on the security of BB84 when imperfect qubit encoding and vulnerability of measurement device are both considered. In our analysis, the potential attacks to measurement device are generalized by the recently proposed weak randomness model which assumes the input random numbers are partially biased depending on a hidden variable planted by an eavesdropper. And the inevitable encoding inaccuracy is also introduced here. From a fundamental view, our work reveals the potential information leakage due to encoding inaccuracy and weak randomness input. For applications, our result can be viewed as a useful tool to quantitatively evaluate the security of a practical QKD system.
language: eng
source:
identifier: ISSN: 1570-0755 ; E-ISSN: 1573-1332 ; DOI: 10.1007/s11128-018-1830-0
fulltext: fulltext
issn:
  • 1573-1332
  • 15731332
  • 1570-0755
  • 15700755
url: Link


@attributes
ID1741160028
RANK0.07
NO1
SEARCH_ENGINEprimo_central_multiple_fe
SEARCH_ENGINE_TYPEPrimo Central Search Engine
LOCALfalse
PrimoNMBib
record
control
sourcerecordid10.1007/s11128-018-1830-0
sourceidspringer_jour
recordidTN_springer_jour10.1007/s11128-018-1830-0
sourcesystemPC
pqid1992701756
galeid525739963
display
typearticle
titleSecurity of BB84 with weak randomness and imperfect qubit encoding
creatorZhao, Liang-Yuan ; Yin, Zhen-Qiang ; Li, Hong-Wei ; Chen, Wei ; Fang, Xi ; Han, Zheng-Fu ; Huang, Wei
ispartofQuantum Information Processing, 2018, Vol.17(3), pp.1-13
identifier
subjectQuantum key distribution ; BB84 ; Weak randomness ; State flaws
descriptionThe main threats for the well-known Bennett–Brassard 1984 (BB84) practical quantum key distribution (QKD) systems are that its encoding is inaccurate and measurement device may be vulnerable to particular attacks. Thus, a general physical model or security proof to tackle these loopholes simultaneously and quantitatively is highly desired. Here we give a framework on the security of BB84 when imperfect qubit encoding and vulnerability of measurement device are both considered. In our analysis, the potential attacks to measurement device are generalized by the recently proposed weak randomness model which assumes the input random numbers are partially biased depending on a hidden variable planted by an eavesdropper. And the inevitable encoding inaccuracy is also introduced here. From a fundamental view, our work reveals the potential information leakage due to encoding inaccuracy and weak randomness input. For applications, our result can be viewed as a useful tool to quantitatively evaluate the security of a practical QKD system.
languageeng
source
version4
lds50peer_reviewed
links
openurl$$Topenurl_article
openurlfulltext$$Topenurlfull_article
backlink$$Uhttp://dx.doi.org/10.1007/s11128-018-1830-0$$EView_full_text_in_Springer_(Subscribers_only)
search
creatorcontrib
0Zhao, Liang-Yuan
1Yin, Zhen-Qiang
2Li, Hong-Wei
3Chen, Wei
4Fang, Xi
5Han, Zheng-Fu
6Huang, Wei
titleSecurity of BB84 with weak randomness and imperfect qubit encoding
descriptionThe main threats for the well-known Bennett–Brassard 1984 (BB84) practical quantum key distribution (QKD) systems are that its encoding is inaccurate and measurement device may be vulnerable to particular attacks. Thus, a general physical model or security proof to tackle these loopholes simultaneously and quantitatively is highly desired. Here we give a framework on the security of BB84 when imperfect qubit encoding and vulnerability of measurement device are both considered. In our analysis, the potential attacks to measurement device are generalized by the recently proposed weak randomness model which assumes the input random numbers are partially biased depending on a hidden variable planted by an eavesdropper. And the inevitable encoding inaccuracy is also introduced here. From a fundamental view, our work reveals the potential information leakage due to encoding inaccuracy and weak randomness input. For applications, our result can be viewed as a useful tool to quantitatively evaluate the security of a practical QKD system.
subject
0Quantum key distribution
1BB84
2Weak randomness
3State flaws
general
010.1007/s11128-018-1830-0
1English
2Springer Science & Business Media B.V.
3SpringerLink
sourceidspringer_jour
recordidspringer_jour10.1007/s11128-018-1830-0
issn
01573-1332
115731332
21570-0755
315700755
rsrctypearticle
creationdate2018
addtitle
0Quantum Information Processing
1Quantum Inf Process
searchscopespringer_journals_complete
scopespringer_journals_complete
lsr30VSR-Enriched:[orcidid, pages, pqid, galeid]
sort
titleSecurity of BB84 with weak randomness and imperfect qubit encoding
authorZhao, Liang-Yuan ; Yin, Zhen-Qiang ; Li, Hong-Wei ; Chen, Wei ; Fang, Xi ; Han, Zheng-Fu ; Huang, Wei
creationdate20180300
facets
frbrgroupid8482723461117239508
frbrtype5
newrecords20180207
languageeng
creationdate2018
topic
0Quantum Key Distribution
1Bb84
2Weak Randomness
3State Flaws
collectionSpringerLink
prefilterarticles
rsrctypearticles
creatorcontrib
0Zhao, Liang-Yuan
1Yin, Zhen-Qiang
2Li, Hong-Wei
3Chen, Wei
4Fang, Xi
5Han, Zheng-Fu
6Huang, Wei
jtitleQuantum Information Processing
toplevelpeer_reviewed
delivery
delcategoryRemote Search Resource
fulltextfulltext
addata
aulast
0Zhao
1Yin
2Li
3Chen
4Fang
5Han
6Huang
aufirst
0Liang-Yuan
1Zhen-Qiang
2Hong-Wei
3Wei
4Xi
5Zheng-Fu
au
0Zhao, Liang-Yuan
1Yin, Zhen-Qiang
2Li, Hong-Wei
3Chen, Wei
4Fang, Xi
5Han, Zheng-Fu
6Huang, Wei
atitleSecurity of BB84 with weak randomness and imperfect qubit encoding
jtitleQuantum Information Processing
stitleQuantum Inf Process
risdate201803
volume17
issue3
spage1
epage13
issn1570-0755
eissn1573-1332
genrearticle
ristypeJOUR
abstractThe main threats for the well-known Bennett–Brassard 1984 (BB84) practical quantum key distribution (QKD) systems are that its encoding is inaccurate and measurement device may be vulnerable to particular attacks. Thus, a general physical model or security proof to tackle these loopholes simultaneously and quantitatively is highly desired. Here we give a framework on the security of BB84 when imperfect qubit encoding and vulnerability of measurement device are both considered. In our analysis, the potential attacks to measurement device are generalized by the recently proposed weak randomness model which assumes the input random numbers are partially biased depending on a hidden variable planted by an eavesdropper. And the inevitable encoding inaccuracy is also introduced here. From a fundamental view, our work reveals the potential information leakage due to encoding inaccuracy and weak randomness input. For applications, our result can be viewed as a useful tool to quantitatively evaluate the security of a practical QKD system.
copNew York
pubSpringer US
doi10.1007/s11128-018-1830-0
orcidid0000-0001-6192-9102
pages1-13
date2018-03