Abstract

Recently Boykin, Biham, Boyer, Mor, and Roychowdhury (BBBMR) proved the security of standard quantum key distribution against the most general attacks which can be performed on the channel [1]. The attack is performed by an eavesdropper who has unlimited computation abilities, and who uses the full power allowed by the rules of classical and quantum physics. The final key can then be used to transmit secure messages in a way that their security is also unaffected in the future. We explain here some of the subtleties related to the term “proving security”. We also present a simplified protocol, and we explain the role it plays in proving the security of the standard Bennett-Brassard protocol for quantum key distribution.KeywordsQuantum Key DistributionCryptographySecurity

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call