Papers
Topics
Authors
Recent
Detailed Answer
Quick Answer
Concise responses based on abstracts only
Detailed Answer
Well-researched responses based on abstracts and relevant paper content.
Custom Instructions Pro
Preferences or requirements that you'd like Emergent Mind to consider when generating responses
Gemini 2.5 Flash
Gemini 2.5 Flash 56 tok/s
Gemini 2.5 Pro 39 tok/s Pro
GPT-5 Medium 15 tok/s Pro
GPT-5 High 16 tok/s Pro
GPT-4o 99 tok/s Pro
Kimi K2 155 tok/s Pro
GPT OSS 120B 476 tok/s Pro
Claude Sonnet 4 38 tok/s Pro
2000 character limit reached

Comprehensive Analysis of BB84, A Quantum Key Distribution Protocol (2312.05609v1)

Published 9 Dec 2023 in quant-ph, cs.CR, cs.CY, cs.ET, and cs.NI

Abstract: Quantum Key Distribution (QKD) is a technique that enables secure communication between two parties by sharing a secret key. One of the most well-known QKD protocols is the BB84 protocol, proposed by Charles Bennett and Gilles Brassard in 1984. In this protocol, Alice and Bob use a quantum channel to exchange qubits, allowing them to generate a shared key that is resistant to eavesdropping. This paper presents a comparative study of existing QKD schemes, including the BB84 protocol, and highlights the advancements made in the BB84 protocol over the years. The study aims to provide a comprehensive overview of the different QKD schemes and their strengths and weaknesses and demonstrate QKDs working principles through existing simulations and implementations. Through this study, we show that the BB84 protocol is a highly secure QKD scheme that has been extensively studied and implemented in various settings. Furthermore, we discuss the improvements made to the BB84 protocol to enhance its security and practicality, including the use of decoy states and advanced error correction techniques. Overall, this paper provides a comprehensive analysis of QKD schemes, focusing on the BB84 protocol in secure communication technologies.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (8)
  1. T. Forcer, A. Hey, D. Ross, and P. Smith, “Superposition, entanglement and quantum computation,” Quantum Information and Computation, vol. 2, no. 2, pp. 97– 116, 2002.
  2. National Institute of Standards and Technology (NIST). (2021, March 1). Cryptography in the Quantum Age. Introduction to the New Quantum Revolution. https://www.nist.gov/physics/introduction-new-quantum-revolution/cryptography-quantum-age
  3. ETH Zurich Department of Physics. (2022, July 27). A key role for quantum entanglement: Breakthrough in experimental quantum cryptography. ScienceDaily. https://www.sciencedaily.com/releases/2022/07/220727124104.html
  4. Castelvecchi, D. (2011). Swiss Test Quantum Cryptography. Scientific American. Retrieved from https://www.scientificamerican.com/article/swiss-test-quantum-cryptography/.
  5. V AD, V K. Enhanced BB84 quantum cryptography protocol for secure communication in wireless body sensor networks for medical applications. Pers Ubiquitous Comput. 2021 Mar 18:1-11. doi: 10.1007/s00779-021-01546-z. Epub ahead of print. PMID: 33758585; PMCID: PMC7971400.
  6. https://www.st-andrews.ac.uk/physics/quvis/simulations_html5/sims/cryptography-bb84/Quantum_Cryptography.html
  7. ETSI GS QKD 004 V2.1.1 (2016-07) "Quantum Key Distribution (QKD); Security Requirements and Evaluation Framework". https://www.etsi.org/deliver/etsi_gs/QKD/001_099/004/02.01.01_60/gs_qkd004v020101p.pdf
  8. ETSI GS QKD 014 V1.1.1: Quantum Key Distribution (QKD); Security Proof; Part 1: General, 2011. https://www.etsi.org/deliver/etsi_gs/QKD/001_099/014/01.01.01_60/gs_qkd014v010101p.pdf
Citations (4)
List To Do Tasks Checklist Streamline Icon: https://streamlinehq.com

Collections

Sign up for free to add this paper to one or more collections.

Summary

We haven't generated a summary for this paper yet.

Dice Question Streamline Icon: https://streamlinehq.com

Follow-Up Questions

We haven't generated follow-up questions for this paper yet.