z-logo
open-access-imgOpen Access
Quantum key distribution secure threshold based on BB84 protocol
Author(s) -
Nan Zhao,
Changxing Pei,
Dan Liu,
Dongxiao Quan,
Sun Xiao-Nan
Publication year - 2011
Publication title -
wuli xuebao
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.199
H-Index - 47
ISSN - 1000-3290
DOI - 10.7498/aps.60.090307
Subject(s) - bb84 , eavesdropping , quantum key distribution , computer science , protocol (science) , quantum cryptography , key (lock) , channel (broadcasting) , imperfect , computer network , computer security , quantum channel , quantum , topology (electrical circuits) , physics , mathematics , quantum information , quantum mechanics , medicine , linguistics , philosophy , alternative medicine , pathology , combinatorics
Quantum state in the channel is affected by several factors, which will bring detection error and make secure threshold of quantum distribution protocol unable to judge whether eavesdropping exists. We analyze the factors in real quantum channel, which affects the quantum state, develop a channel model, and derive a judging eavesdrop secure threshold formula of BB84 protocol based on an imperfect channel. Through calculating and simulating, the formula is proved to be more accurate to estimate the secure threshold of the BB84 protocol and more effective to judge eavesdropping. Meanwhile, this method can improve the security and the efficiency of key distribution.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here