Next Article in Journal
Computer-Aided Diagnosis in Mammography Using Content-Based Image Retrieval Approaches: Current Status and Future Perspectives
Next Article in Special Issue
Bayesian Maximum Entropy Based Algorithm for Digital X-ray Mammogram Processing
Previous Article in Journal / Special Issue
SDPhound, a Mutual Information-Based Method to Investigate Specificity-Determining Positions
Open AccessArticle

Security of the Bennett-Brassard Quantum Key Distribution Protocol against Collective Attacks

by 1,†, 2,*,† and 2, †
Departement IRO, Université de Montréal, CP 6128 Succ. Centre-Ville, Montréal H3C 3J7, Canada
Computer Science Department, Technion, Haifa 32000, Israel
Author to whom correspondence should be addressed.
Alphabetical authors order.
Algorithms 2009, 2(2), 790-807;
Received: 16 October 2008 / Revised: 17 April 2009 / Accepted: 7 May 2009 / Published: 3 June 2009
(This article belongs to the Special Issue Algorithms and Molecular Sciences)
The theoretical Quantum Key-Distribution scheme of Bennett and Brassard (BB84) has been proven secure against very strong attacks including the collective attacks and the joint attacks. Though the latter are the most general attacks, collective attacks are much easier to analyze, yet, they are conjectured to be as informative to the eavesdropper. Thus, collective attacks are likely to be useful in the analysis of many theoretical and practical schemes that are still lacking a proof of security, including practical BB84 schemes. We show how powerful tools developed in previous works for proving security against the joint attack, are simplified when applied to the security of BB84 against collective attacks whilst providing the same bounds on leaked information and the same error threshold. View Full-Text
Keywords: QKD; security; collective attacks; error-rate threshold QKD; security; collective attacks; error-rate threshold
MDPI and ACS Style

Boyer, M.; Gelles, R.; Mor, T. Security of the Bennett-Brassard Quantum Key Distribution Protocol against Collective Attacks. Algorithms 2009, 2, 790-807.

Show more citation formats Show less citations formats

Article Access Map

Only visits after 24 November 2015 are recorded.
Back to TopTop