Next Article in Journal
Computer-Aided Diagnosis in Mammography Using Content-Based Image Retrieval Approaches: Current Status and Future Perspectives
Next Article in Special Issue
Bayesian Maximum Entropy Based Algorithm for Digital X-ray Mammogram Processing
Previous Article in Journal / Special Issue
SDPhound, a Mutual Information-Based Method to Investigate Specificity-Determining Positions
Algorithms 2009, 2(2), 790-807; doi:10.3390/a2020790

Security of the Bennett-Brassard Quantum Key Distribution Protocol against Collective Attacks

2,†,*  and 2, †
1 Departement IRO, Université de Montréal, CP 6128 Succ. Centre-Ville, Montréal H3C 3J7, Canada 2 Computer Science Department, Technion, Haifa 32000, Israel Alphabetical authors order.
* Author to whom correspondence should be addressed.
Received: 16 October 2008 / Revised: 17 April 2009 / Accepted: 7 May 2009 / Published: 3 June 2009
(This article belongs to the Special Issue Algorithms and Molecular Sciences)
Download PDF [304 KB, uploaded 3 June 2009]


The theoretical Quantum Key-Distribution scheme of Bennett and Brassard (BB84) has been proven secure against very strong attacks including the collective attacks and the joint attacks. Though the latter are the most general attacks, collective attacks are much easier to analyze, yet, they are conjectured to be as informative to the eavesdropper. Thus, collective attacks are likely to be useful in the analysis of many theoretical and practical schemes that are still lacking a proof of security, including practical BB84 schemes. We show how powerful tools developed in previous works for proving security against the joint attack, are simplified when applied to the security of BB84 against collective attacks whilst providing the same bounds on leaked information and the same error threshold.
Keywords: QKD; security; collective attacks; error-rate threshold QKD; security; collective attacks; error-rate threshold
This is an open access article distributed under the Creative Commons Attribution License (CC BY) which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Share & Cite This Article

Further Mendeley | CiteULike
Export to BibTeX |
MDPI and ACS Style

Boyer, M.; Gelles, R.; Mor, T. Security of the Bennett-Brassard Quantum Key Distribution Protocol against Collective Attacks. Algorithms 2009, 2, 790-807.

View more citation formats

Article Metrics

For more information on the journal, click here


Cited By

[Return to top]
Algorithms EISSN 1999-4893 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert