Next Article in Journal
Computer-Aided Diagnosis in Mammography Using Content-Based Image Retrieval Approaches: Current Status and Future Perspectives
Next Article in Special Issue
Bayesian Maximum Entropy Based Algorithm for Digital X-ray Mammogram Processing
Previous Article in Journal / Special Issue
SDPhound, a Mutual Information-Based Method to Investigate Specificity-Determining Positions
Article Menu

Export Article

Open AccessArticle
Algorithms 2009, 2(2), 790-807;

Security of the Bennett-Brassard Quantum Key Distribution Protocol against Collective Attacks

2,†,* and 2, †
Departement IRO, Université de Montréal, CP 6128 Succ. Centre-Ville, Montréal H3C 3J7, Canada
Computer Science Department, Technion, Haifa 32000, Israel
Alphabetical authors order.
Author to whom correspondence should be addressed.
Received: 16 October 2008 / Revised: 17 April 2009 / Accepted: 7 May 2009 / Published: 3 June 2009
(This article belongs to the Special Issue Algorithms and Molecular Sciences)
Full-Text   |   PDF [304 KB, uploaded 3 June 2009]


The theoretical Quantum Key-Distribution scheme of Bennett and Brassard (BB84) has been proven secure against very strong attacks including the collective attacks and the joint attacks. Though the latter are the most general attacks, collective attacks are much easier to analyze, yet, they are conjectured to be as informative to the eavesdropper. Thus, collective attacks are likely to be useful in the analysis of many theoretical and practical schemes that are still lacking a proof of security, including practical BB84 schemes. We show how powerful tools developed in previous works for proving security against the joint attack, are simplified when applied to the security of BB84 against collective attacks whilst providing the same bounds on leaked information and the same error threshold. View Full-Text
Keywords: QKD; security; collective attacks; error-rate threshold QKD; security; collective attacks; error-rate threshold
This is an open access article distributed under the Creative Commons Attribution License (CC BY 3.0).

Share & Cite This Article

MDPI and ACS Style

Boyer, M.; Gelles, R.; Mor, T. Security of the Bennett-Brassard Quantum Key Distribution Protocol against Collective Attacks. Algorithms 2009, 2, 790-807.

Show more citation formats Show less citations formats

Related Articles

Article Metrics

Article Access Statistics



[Return to top]
Algorithms EISSN 1999-4893 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top