Proceedings. International Symposium on Information Theory, 2005. ISIT 2005. 2005
DOI: 10.1109/isit.2005.1523492
|View full text |Cite
|
Sign up to set email alerts
|

Noise tolerance of the BB84 protocol with random privacy amplification

Abstract: This paper shows that the BB84 protocol with random privacy amplification is secure with a higher key rate than Mayers' estimate with the same error rate. Consequently, the tolerable error rate of this protocol is increased from 7.5 % to 11 %. We also extend this method to the case of estimating error rates separately in each basis, which enables us to securely share a longer key.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
1

Year Published

2006
2006
2022
2022

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 7 publications
(16 citation statements)
references
References 23 publications
0
15
1
Order By: Relevance
“…As a result, Alice and Bob obtains sifted key k A , k B ∈ F n 2 , respectively. 2) Alice picks a random number r A ∈ F l 2 , and By using the widely used proof technique due to Shor and Preskill [37], [13], [41], [18], the unconditonal security of this protocol has been shown for the case where F consists of the completely random linear functions [41], [18]. On the other hand, by using the quantum de Finneti representation theorem, Renner proved the unconditional security of the BB84 protocol using universal 2 hash functions for privacy amplification [35].…”
Section: Quantum Key Distributionmentioning
confidence: 99%
See 1 more Smart Citation
“…As a result, Alice and Bob obtains sifted key k A , k B ∈ F n 2 , respectively. 2) Alice picks a random number r A ∈ F l 2 , and By using the widely used proof technique due to Shor and Preskill [37], [13], [41], [18], the unconditonal security of this protocol has been shown for the case where F consists of the completely random linear functions [41], [18]. On the other hand, by using the quantum de Finneti representation theorem, Renner proved the unconditional security of the BB84 protocol using universal 2 hash functions for privacy amplification [35].…”
Section: Quantum Key Distributionmentioning
confidence: 99%
“…In Section VI, we apply these results to the security proof of a QKD protocol called the Bennett-Brassard 1984 (BB84) protocol [2]. We use the proof technique of the Shor-Preskilltype, which reduces the security of a secret key to the error correcting property of the Calderbank-Shor-Steane (CSS) quantum error correcting code (e.g., [37], [13], [41], [18]). This proof technique is elegant and widely used, but also has a drawback.…”
Section: Introductionmentioning
confidence: 99%
“…Hence, the security level of a real system is also finite and needs to be precisely quantified. This problem has been theoretically addressed in a few security proofs [11][12][13][14][15][16][17][18], some of which also guarantee composable security [19,20]. Most of them consider a QKD setup running with the BB84 protocol [2] and making use of an ideal single-photon source.…”
Section: Introductionmentioning
confidence: 99%
“…It is stated in [12] and proved in [14] that random choice of [n − nh(q Z )]-dimensional subspace C 2 in C 1 almost always gives the low phase error decoding probability in the standard CSS decoding procedure. This implies that randomly chosen [n − nh(q Z )]-dimensional subspace C 2 in C 1 can almost always correct HZ errors on Γ.…”
Section: Security Proof and Analysis Of The Key Ratementioning
confidence: 99%