Explore chapters and articles related to this topic
Quantum Cryptography and Quantum Key Distribution
Published in Shashi Bhushan, Manoj Kumar, Pramod Kumar, Renjith V. Ravi, Anuj Kumar Singh, Holistic Approach to Quantum Cryptography in Cyber Security, 2023
Chindiyababy, Ramkumar Jayaraman, Manoj Kumar
The first key distribution protocol called BB84 protocol was proposed by Bennett and Brassard in 1984, which uses quantum states for secure key distribution. It works based on Heisenberg's uncertainty principle. The basic idea of all other protocol implementations is based on this protocol. Heisenberg's uncertainty principle ensures that the eavesdropper can't measure any photons from Alice and send them to Bob without disturbing his photon's state so that the communication becomes more secure. If eavesdropper will do any modification, then it confirms its presence. It is based on the principles of Heisenberg's uncertainty principle and no-cloning theorem. In the prepare-and-measure-based protocol, first the quantum states are prepared and send through the quantum channel. Afterward, it could be measured. This protocol has done its work with the help of the polarization of photons to implement qubits.
The Second Quantum Revolution
Published in Jonathan P. Dowling, Schrödinger’s Web, 2020
Charles Bennett, an American scientist who works at IBM, was a colleague of Wiesner and was fascinated with the ideas in Wiesner’s quantum money manuscript. (See Figure 5.10.) Two out of the three requirements for quantum technology were both there, years before anybody had defined what quantum technology was. In 1984, Bennett and Canadian scientist Gilles Brassard expanded on the ideas of Wiesner to produce the first paper on quantum cryptography. Since it was published in 1984, and the authors were Bennett and Brassard, the paper is universally referred to as BB84. I have discussed this protocol in agonizing detail in my previous book, and I’ll only briefly review the topic here.38
The Longer Term: Quantum Information Processing and Communication
Published in Simon Deleonibus, Electronic Device Architectures for the Nano-CMOS Era, 2019
The BB84 protocol for quantum key distribution is one of the oldest achievements in the domain of quantum information. Its theoretical principles were discovered and published in 1984 by Charles Bennett, from IBM Research Yorktown, and Gilles Brassard, from the University of Montreal. BB84 is also the first theoretical result in quantum information which is currently giving rise to the design and marketing of commercial products for secure information transmission, where the security is based on the measurement postulate of quantum mechanics.
Efficient quantum secret sharing based on polarization and orbital angular momentum
Published in Journal of the Chinese Institute of Engineers, 2019
In the traditional QSS schemes based on the BB84 protocol, about half of the particles are used to check the eavesdropping, and cannot be used to bring secret information. So the utilization efficiency of particles is only about 50%. In the QSS schemes based on decoy particles, the decoy particles can only be used to protect the secret particles, and cannot be used to bring secret information. So the utilization efficiency of particles cannot reach 100% either.