A Simulative Comparison of BB84 Protocol with its Improved Version

Authors

  • Mohsen Sharifi Computer Engineering Department, Iran University of Science and Technology, Tehran, Iran
  • Hooshang Azizi Computer Engineering Department, Iran University of Science and Technology, Tehran, Iran

Keywords:

Cryptography, BB84 Protocol, Quantum Cryptography, Quantum Key Distribution

Abstract

Public key cryptosystems can well become void with the advent of incredibly high performance quantum computers. The underlying principles of these computers themselves, namely quantum mechanics, provide the solution to the key distribution problem. This paper explains how cryptography will be benefited from quantum mechanics, through a short introduction to classical cryptography, and the general principles of quantum cryptography and the BB84 protocol for key distribution. Then we review a modification to the BB84 protocol that is logically claimed to increase its efficiency. We then validate this claim by presenting our simulation results for BB84 and its improved protocols and show that the efficiency of the improved protocol could be doubled without undermining the security level of BB84 protocol.

Downloads

Download data is not yet available.

References

[1] P. Shor, “Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer”, SIAM Journal of Computing, 26, 1997.
[2] S. J. Lomonaco, “A Talk on Quantum Cryptography or How Alice Outwits Eve”, Preprint at Los Alamos Physics Preprint Archive, 2001 http://xxx.lanl.gov/abs/quant-ph/0102016
[3] V. Volovich, and Y. I. Volovich, “On Classical and Quantum Cryptography”, Preprint at Los Alamos Physics Preprint Archive, 2001 http://xxx.lanl.gov/abs/quant-ph/0108133
[4] N. Gisin, G. Ribordy, W. Tittel, and H. Zbinden, “Quantum Cryptography”, Group of Applied Physics, University of Geneva, 2001.
[5] H. Bennet, F. Bessette, G. Brassard, L. Salvail, and J. Smolin, “Experimental Quantum Cryptography”, Journal of Cryptography, Vol. 5, 1992, pp. 3-28.
[6] D. Mayers, “Unconditional Security in Quantum Cryptography”, Preprint at Los Alamos Physics Preprint Archive, 1998 http://xxx.lanl.gov/abs/quant-ph/9802025
[7] H. Zbinden, H. Bechmann-Pasquinucci, N. Gisin, and G. Ribordy, “Quantum Cryptography”, Applied Physics B 67, 1998, pp. 743-748.
[8] D. Stucki, N. Gisin, O. Guinnard, G. Riordy, and H. Zbinden, “Quantum Key Distribution over 67 km with a Plug & Play System”, New Journal of Physics 4, 2002.
[9] R. J. Hughes, J. E. Nordholt, D. Derkacs, and C. G. Peterson, “Practical Free-Space Quantum Key Distribution over 10 km in Daylight and at Night”, Preprint at Los Alamos Physics Preprint Archive, 2002 http://xxx.lanl.gov/abs/quant-ph/0206092
[10] H. K. Lo, “Will Quantum Cryptography Ever Become a Successful Technology in the Marketplace?”, MagiQ Technologies Inc., 2001.
[11] M. Ardehali, H. F. Chau, and H. K. Lo, “Efficient Quantum Key Distribution”, Preprint at Los Alamos Physics Preprint Archive, 1999 http://xxx.lanl.gov/abs/quant-ph/9803007

Downloads

Published

2007-10-01

How to Cite

Sharifi, M., & Azizi, H. (2007). A Simulative Comparison of BB84 Protocol with its Improved Version. Journal of Computer Science and Technology, 7(03), p. 204–208. Retrieved from https://journal.info.unlp.edu.ar/JCST/article/view/772

Issue

Section

Original Articles