arXiv Analytics

Sign in

arXiv:1209.6479 [quant-ph]AbstractReferencesReviewsResources

Effects of preparation and measurement misalignments on the security of the BB84 quantum key distribution protocol

Erik Woodhead, Stefano Pironio

Published 2012-09-28, updated 2013-03-20Version 4

The ideal Bennett-Brassard 1984 (BB84) quantum key distribution protocol is based on the preparation and measurement of qubits in two alternative bases differing by an angle of pi/2. Any real implementation of the protocol, though, will inevitably introduce misalignments in the preparation of the states and in the alignment of the measurement bases with respect to this ideal situation. Various security proofs take into account (at least partially) such errors, i.e., show how Alice and Bob can still distil a secure key in the presence of these imperfections. Here, we consider the complementary problem: how can Eve exploit misalignments to obtain more information about the key than would be possible in an ideal implementation? Specifically, we investigate the effects of misalignment errors on the security of the BB84 protocol in the case of individual attacks, where necessary and sufficient conditions for security are known. Though the effects of these errors are small for expected deviations from the perfect situation, our results nevertheless show that Alice and Bob can incorrectly conclude that they have established a secure key if the inevitable experimental errors in the state preparation and in the alignment of the measurements are not taken into account. This gives further weight to the idea that the formulation and security analysis of any quantum cryptography protocol should be based on realistic assumptions about the properties of the apparatus used. Additionally, we note that BB84 seems more robust against alignment imperfections if both the x and z bases are used to generate the key.

Related articles: Most relevant | Search more
arXiv:1009.3830 [quant-ph] (Published 2010-09-20)
Passive sources for the Bennett-Brassard 1984 quantum key distribution protocol with practical signals
arXiv:quant-ph/0403148 (Published 2004-03-20, updated 2005-01-11)
Robustness of the BB84 quantum key distribution protocol against general coherent attacks
arXiv:0806.3954 [quant-ph] (Published 2008-06-24, updated 2009-06-25)
Continuous-variable quantum key distribution protocols over noisy channels