Simple Proof of Security of the BB84 Quantum Key Distribution Protocol

Simple Proof of Security of the BB84 Quantum Key Distribution Protocol

(February 1, 2008) | Peter W. Shor(1) and John Preskill(2)
The paper by Peter W. Shor and John Preskill provides a simple proof of the security of the BB84 quantum key distribution protocol. They start by introducing an entanglement purification protocol based on Calderbank-Shor-Steane (CSS) codes, which can be proven secure using methods from Lo and Chau's proof for a similar protocol. The security of this protocol is then shown to imply the security of BB84. The proof leverages the properties of CSS codes, particularly the decoupling of phase and bit error correction, to remove the need for quantum computation in the Lo-Chau protocol. The authors review CSS codes and associated entanglement purification protocols, explaining how these codes can correct both bit and phase errors without disturbing the encoded state. They also describe the Bell basis, which consists of four maximally entangled states, and introduce a class of quantum error-correcting codes equivalent to CSS codes. The paper presents two protocols: a modified Lo-Chau protocol and a CSS codes protocol. The modified Lo-Chau protocol involves Alice creating EPR pairs, performing Hadamard transformations on selected pairs, and sending them to Bob. Bob receives the qubits, measures the syndrome, and performs Hadamards on the selected pairs. If the measurements disagree too much, the protocol aborts. Alice and Bob then measure the EPR pairs in the $|0\rangle$ and $|1\rangle$ basis to obtain a shared secret key. The CSS codes protocol involves Alice creating random check bits, a random key, and a random string $b$. Alice encodes the key using a CSS code, selects positions for check bits and code bits, applies Hadamard transformations, and sends the state to Bob. Bob acknowledges receipt, performs Hadamards, and decodes the key bits. Finally, the authors show that the CSS codes protocol is equivalent to the BB84 protocol by demonstrating that the error correction information Alice provides is sufficient to derive the key. They also address practical considerations, such as using efficient classical codes and handling imperfect sources, though they note that current proofs do not cover weak coherent sources used in experimental systems.The paper by Peter W. Shor and John Preskill provides a simple proof of the security of the BB84 quantum key distribution protocol. They start by introducing an entanglement purification protocol based on Calderbank-Shor-Steane (CSS) codes, which can be proven secure using methods from Lo and Chau's proof for a similar protocol. The security of this protocol is then shown to imply the security of BB84. The proof leverages the properties of CSS codes, particularly the decoupling of phase and bit error correction, to remove the need for quantum computation in the Lo-Chau protocol. The authors review CSS codes and associated entanglement purification protocols, explaining how these codes can correct both bit and phase errors without disturbing the encoded state. They also describe the Bell basis, which consists of four maximally entangled states, and introduce a class of quantum error-correcting codes equivalent to CSS codes. The paper presents two protocols: a modified Lo-Chau protocol and a CSS codes protocol. The modified Lo-Chau protocol involves Alice creating EPR pairs, performing Hadamard transformations on selected pairs, and sending them to Bob. Bob receives the qubits, measures the syndrome, and performs Hadamards on the selected pairs. If the measurements disagree too much, the protocol aborts. Alice and Bob then measure the EPR pairs in the $|0\rangle$ and $|1\rangle$ basis to obtain a shared secret key. The CSS codes protocol involves Alice creating random check bits, a random key, and a random string $b$. Alice encodes the key using a CSS code, selects positions for check bits and code bits, applies Hadamard transformations, and sends the state to Bob. Bob acknowledges receipt, performs Hadamards, and decodes the key bits. Finally, the authors show that the CSS codes protocol is equivalent to the BB84 protocol by demonstrating that the error correction information Alice provides is sufficient to derive the key. They also address practical considerations, such as using efficient classical codes and handling imperfect sources, though they note that current proofs do not cover weak coherent sources used in experimental systems.
Reach us at info@study.space