z-logo
open-access-imgOpen Access
Stop Conditions of BB84 Protocol via a Depolarizing Channel (Quantum Cryptography)
Author(s) -
Iyed Ben Slimen,
Olfa Trabelsi,
Houria Rezig,
Ridha Bouallà ̈gu,
Ammar Bouallègue
Publication year - 2007
Publication title -
journal of computer science
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.161
H-Index - 28
eISSN - 1552-6607
pISSN - 1549-3636
DOI - 10.3844/jcssp.2007.424.429
Subject(s) - computer science , bb84 , quantum cryptography , protocol (science) , computer network , cryptography , quantum , computer security , quantum information , physics , quantum mechanics , medicine , alternative medicine , pathology
BB84 (Bennett and Brassard 1984) is one of the well known protocols of quantum keys distribution. It is built to allow two interlocutors commonly called Alice and Bob to share two similar binary keys and to detect the eavesdropper presence (the eavesdropper is commonly called Eve). However, Eve presence in a disturbed environment causes errors to the sifted keys and decreases the amount of secure information between Alice and Bob. One of the most important stages in BB84 protocol is to decide by using error probability estimation if we can continue the protocol phases or no. Indeed, this decision is function of some factors like: what is the amount of information that we will lose in the error correction phase? What is the degree of errors detected in our sifted keys? What is the origin of these errors: Eve strategy or the channel disturbance? For these reasons, we will study in this study some conditions to stop BB84 protocol in the context of depolarizing channel. We implement two types of eavesdropping strategy: Intercept and Resend and Cloning Attack

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom