Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

BB84

From Wikipedia, the free encyclopedia
Quantum key distribution protocol

TheBB84 protocol, named after its inventorsCharles Bennett andGilles Brassard in 1984, is a prepare-and-measureQuantum key distribution (QKD) protocol, in which, one party (e.g. Alice) performs the encoding by preparing the quantum states, and the other party (e.g., Bob) measures them.[1] The BB84 QKD scheme is the firstquantum cryptographyprotocol, and has become one of the most well-studied QKD protocols.[2] The protocol isprovably secure assuming a perfect implementation, relying on two conditions: (1) the quantum property that information gain is only possible at the expense of disturbing the signal if the two states one is trying to distinguish are not orthogonal (seeno-cloning theorem); and (2) the existence of anauthenticated public classical channel.[3] As such, the security of the BB84 protocol is fundamentally based on the principle that two non-orthogonal quantum states cannot be perfectly distinguished. This inherent limitation means that the states cannot be reliably copied, thereby ensuring a robust framework for secure quantum communication. The BB84 QKD protocol is usually explained as a method of securely communicating aprivate key from one party to another for use inone-time pad encryption.[4]The proof of BB84 QKD scheme depends on a perfect implementation. Side channel attacks exist, taking advantage of non-quantum sources of information. Since this information is non-quantum, it can be intercepted without measuring or cloning quantum particles.[5] The BB84 protocol provides a significant advancement in the field of quantum cryptography and represents a pioneering step toward achieving secure communication in the quantum era.[6]

Overview

[edit]

BB84 QKD system transmits individual photons through a fiber optic cable, with each photon representing a bit of data (zero or one). Polarizing filters on the sender's side set each photon's orientation, while the receiver uses beam splitters to read it. The sender and receiver then compare their photon orientations, with the matching set becoming the cryptographic key.[7] However, encoding with other degrees of freedom, e.g., phase, is also possible, and the procedures are similar.[8]

Description

[edit]
An interactive simulation of anoptical implementation of the BB84 quantum key distribution protocol in the Virtual Lab by Quantum Flytrap,[9]available online. In this optical setup, bits are encoded using orthogonalpolarization states ofphotons. Alice and Bob select their measurement bases by rotating the polarization by 0 or 45 degrees usingFaraday rotators.Single-photon detectors measure the output after the photons pass through apolarizing beam splitter, which separates the polarizations.

In the BB84 scheme,Alice wishes to send a private key toBob. She begins with two strings ofbits,a{\displaystyle a} andb{\displaystyle b}, eachn{\displaystyle n} bits long. She then prepares ann{\displaystyle n}-qubit state written as:

|ψ=i=1n|ψaibi,{\displaystyle |\psi \rangle =\bigotimes _{i=1}^{n}|\psi _{a_{i}b_{i}}\rangle ,}

whereai{\displaystyle a_{i}} andbi{\displaystyle b_{i}} are thei{\displaystyle i}-th bits ofa{\displaystyle a} andb{\displaystyle b} respectively. Together,aibi{\displaystyle a_{i}b_{i}} give us an index into the following four qubit states:

|ψ00=|0,{\displaystyle |\psi _{00}\rangle =|0\rangle ,}
|ψ10=|1,{\displaystyle |\psi _{10}\rangle =|1\rangle ,}
|ψ01=|+=12|0+12|1,{\displaystyle |\psi _{01}\rangle =|+\rangle ={\frac {1}{\sqrt {2}}}|0\rangle +{\frac {1}{\sqrt {2}}}|1\rangle ,}
|ψ11=|=12|012|1.{\displaystyle |\psi _{11}\rangle =|-\rangle ={\frac {1}{\sqrt {2}}}|0\rangle -{\frac {1}{\sqrt {2}}}|1\rangle .}

Note that the bitbi{\displaystyle b_{i}} is what decides which basisai{\displaystyle a_{i}} is encoded in (either in the computational basis or the Hadamard basis). The qubits are now in states that are not mutually orthogonal, and thus it is impossible to distinguish all of them with certainty without knowingb{\displaystyle b}.

Alice sends|ψ{\displaystyle |\psi \rangle } over a public and authenticatedquantum channelE{\displaystyle {\mathcal {E}}} to Bob. Bob receives a stateE(ρ)=E(|ψψ|){\displaystyle {\mathcal {E}}(\rho )={\mathcal {E}}(|\psi \rangle \langle \psi |)}, whereE{\displaystyle {\mathcal {E}}} represents both the effects of noise in the channel and eavesdropping by a third party we'll call Eve. After Bob receives the string of qubits, both Bob and Eve have their own states. However, since only Alice knowsb{\displaystyle b}, it makes it virtually impossible for either Bob or Eve to distinguish the states of the qubits. Also, after Bob has received the qubits, we know that Eve cannot be in possession of a copy of the qubits sent to Bob, by theno-cloning theorem, unless she has made measurements. Her measurements, however, risk disturbing a particular qubit with probability1/2 if she guesses the wrong basis.

Bob proceeds to generate a string of random bitsb{\displaystyle b'} of the same length asb{\displaystyle b} and then measures the qubits he has received from Alice, obtaining a bit stringa{\displaystyle a'}. At this point, Bob announces publicly that he has received Alice's transmission. Alice then knows she can now safely announceb{\displaystyle b}, i.e., the bases in which the qubits were prepared. Bob communicates over a public channel with Alice to determine whichbi{\displaystyle b_{i}} andbi{\displaystyle b'_{i}} are not equal. Both Alice and Bob now discard the bits ina{\displaystyle a} anda{\displaystyle a'} whereb{\displaystyle b} andb{\displaystyle b'} do not match.

From the remainingk{\displaystyle k} bits where both Alice and Bob measured in the same basis, Alice randomly choosesk/2{\displaystyle k/2} bits and discloses her choices over the public channel. Both Alice and Bob announce these bits publicly and run a check to see whether more than a certain number of them agree. If this check passes, Alice and Bob proceed to useinformation reconciliation and privacy amplification techniques to create some number of shared secret keys. Otherwise, they cancel and start over.

See also

[edit]

References

[edit]
  1. ^Bennett, Charles H.; Brassard, Gilles (2014-12-04)."Quantum cryptography: Public key distribution and coin tossing".Theoretical Computer Science. Theoretical Aspects of Quantum Cryptography – celebrating 30 years of BB84.560:7–11.arXiv:2003.06557.doi:10.1016/j.tcs.2014.05.025.ISSN 0304-3975.
  2. ^Branciard, Cyril; Gisin, Nicolas;Kraus, Barbara; Scarani, Valerio (2005). "Security of two quantum cryptography protocols using the same four qubit states".Physical Review A.72 (3) 032301.arXiv:quant-ph/0505035.Bibcode:2005PhRvA..72c2301B.doi:10.1103/PhysRevA.72.032301.S2CID 53653084.
  3. ^Scarani, Valerio; Bechmann-Pasquinucci, Helle; Cerf, Nicolas J.; Dušek, Miloslav; Lütkenhaus, Norbert; Peev, Momtchil (2009). "The security of practical quantum key distribution".Rev. Mod. Phys.81 (3):1301–1350.arXiv:0802.4155.Bibcode:2009RvMP...81.1301S.doi:10.1103/RevModPhys.81.1301.S2CID 15873250.
  4. ^Quantum Computing and Quantum Information, Michael Nielsen and Isaac Chuang, Cambridge University Press 2000
  5. ^Dixon, A. R., Dynes, J. F., Lucamarini, M., Fröhlich, B., Sharpe, A. W., Plews, A., Tam, W., Yuan, Z. L., Tanizawa, Y., Sato, H., Kawamura, S., Fujiwara, M., Sasaki, M., & Shields, A. J. (2017). Quantum key distribution with hacking countermeasures and long term field trial. Scientific Reports, 7, 1978.
  6. ^Brassard, Gilles (2016). Freivalds, Rūsiņš Mārtiņš; Engels, Gregor; Catania, Barbara (eds.)."Cryptography in a Quantum World".SOFSEM 2016: Theory and Practice of Computer Science. Berlin, Heidelberg: Springer:3–16.arXiv:1510.04256.doi:10.1007/978-3-662-49192-8_1.ISBN 978-3-662-49192-8.
  7. ^"What Is Quantum Cryptography? | IBM".www.ibm.com. 2023-11-29. Retrieved2024-09-25.
  8. ^Gisin, Nicolas; Ribordy, Grégoire; Tittel, Wolfgang; Zbinden, Hugo (2002-03-08)."Quantum cryptography".Reviews of Modern Physics.74 (1):145–195.arXiv:quant-ph/0101098.doi:10.1103/RevModPhys.74.145.
  9. ^Migdał, Piotr; Jankiewicz, Klementyna; Grabarz, Paweł; Decaroli, Chiara; Cochin, Philippe (2022). "Visualizing quantum mechanics in an interactive simulation - Virtual Lab by Quantum Flytrap".Optical Engineering.61 (8) 081808.arXiv:2203.13300.doi:10.1117/1.OE.61.8.081808.
General
Theorems
Quantum
communication
Quantum cryptography
Quantum algorithms
Quantum
complexity theory
Quantum
processor benchmarks
Quantum
computing models
Quantum
error correction
Physical
implementations
Quantum optics
Ultracold atoms
Spin-based
Superconducting
Quantum
programming
Retrieved from "https://en.wikipedia.org/w/index.php?title=BB84&oldid=1336229371"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2026 Movatter.jp