Skip to main content

Another Look at Symmetric Incoherent Optimal Eavesdropping against BB84

  • Conference paper
  • 1269 Accesses

Part of the Lecture Notes in Computer Science book series (LNSC,volume 7668)

Abstract

The BB84 protocol is used by Alice (the sender) and Bob (the receiver) to settle on a secret classical bit-string by communicating qubits over an insecure quantum channel where Eve (the Eavesdropper) can have access. In this paper, we revisit a well known eavesdropping technique against BB84. We claim that there exist certain gaps in understanding the existing eavesdropping strategy in terms of cryptanalytic view and we try to bridge those gaps in this paper.

First we refer to the result where it is shown that in the six-state variant of the BB84 protocol (Bruß, Phys. Rev. Lett., 1998), the mutual information between Alice (the sender) and Eve (the eavesdropper) is higher when two-bit probe is used compared to the one-bit probe and hence the two-bit probe provides a stronger eavesdropping strategy. However, from cryptanalytic point of view, we show that Eve has the same success probability in guessing the bit transmitted by Alice in both the cases of the two-bit and the one-bit probe. Thus, we point out that having higher mutual information may not directly lead to obtaining higher probability in guessing the key bit.

It is also explained in the work of Bruß that the six-state variant of the BB84 protocol is more secure than the traditional four-state BB84. We look into this point in more detail and identify that this advantage is only achieved at the expense of communicating more qubits in the six-state protocol. In fact, we present different scenarios, where given the same number of qubits communicated, the security comparison of the four and six-state protocols is evaluated carefully.

Keywords

  • Advantage
  • BB84
  • Key Distribution
  • Optimal Eavesdropping
  • Quantum Cryptography

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bennett, C.H., Brassard, G.: Quantum Cryptography: Public key distribution and coin tossing. In: Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, India, pp. 175–179. IEEE, New York (1984)

    Google Scholar 

  2. Bennett, C.H., Brassard, G., Robert, J.M.: Privacy amplification by public discussion. SIAM Journal on Computing 17(2), 210–229 (1988)

    CrossRef  MathSciNet  Google Scholar 

  3. Bennett, C.H., Bessette, F., Brassard, G., Salvail, L., Smolin, J.: Experimental quantum cryptography. Journal of Cryptology 5(1), 3–28 (1992)

    CrossRef  MATH  Google Scholar 

  4. Bernstein, D.J., Buchmann, J., Dahmen, E. (eds.): Post-Quantum Cryptography. Springer (2009)

    Google Scholar 

  5. Biham, E., Mor, T.: Bounds on Information and the Security of Quantum Cryptography. Phys. Rev. Lett. 79, 4034–4037 (1997)

    CrossRef  Google Scholar 

  6. Bruß, D.: Optimal eavesdropping in quantum cryptography with six states. Physical Review Letters 81, 3018–3021 (1998) (quant-ph/9805019)

    CrossRef  Google Scholar 

  7. Cirac, J.I., Gisin, N.: Coherent eavesdropping strategies for the 4 state quantum cryptography protocol. Physics Letters A 229(1), 1–7 (1997) (quant-ph/9702002)

    CrossRef  MathSciNet  MATH  Google Scholar 

  8. Cover, T., Thomas, J.: Elements of Information Theory, 1st edn., pp. 16–20. John Wiley & Sons, Inc. (1991)

    Google Scholar 

  9. Diffie, W., Hellman, M.E.: New Directions in Cryptography. IEEE Transactions on Information Theory 22, 644–654 (1976)

    CrossRef  MathSciNet  MATH  Google Scholar 

  10. Fuchs, C.A., Gisin, N., Griffiths, R.B., Niu, C.S., Peres, A.: Optimal eavesdropping in quantum cryptography. I. Information bound and optimal strategy. Physical Review A 56(2), 1163–1172 (1997)

    CrossRef  MathSciNet  Google Scholar 

  11. Miller, V.S.: Use of Elliptic Curves in Cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417–426. Springer, Heidelberg (1986)

    Google Scholar 

  12. Nielsen, M.A., Chuang, I.L.: Quantum Computation and Quantum Information. Cambridge University Press (2002)

    Google Scholar 

  13. Phoenix, S.J.D.: Quantum cryptography without conjugate coding. Physical Review A 48(1), 96–102 (1993)

    CrossRef  MathSciNet  Google Scholar 

  14. Quantum Key Distribution Equipment. ID Quantique (IDQ), http://www.idquantique.com/

  15. Quantum Key Distribution System (Q-Box). MagiQ Technologies Inc., http://www.magiqtech.com

  16. Rivest, R.L., Shamir, A., Adleman, L.: A Method for Obtaining Digital Signatures and Public Key Cryptosystems. Communications of the ACM 21, 120–126 (1978)

    CrossRef  MathSciNet  MATH  Google Scholar 

  17. Shor, P.: Algorithms for Quantum Computation: Discrete Logarithms and Factoring. In: Foundations of Computer Science (FOCS), pp. 124–134. IEEE Computer Society Press (1994)

    Google Scholar 

  18. Stinson, D.: Cryptography Theory and Practice, 3rd edn., pp. 80–81. Chapman & Hall / CRC (2005)

    Google Scholar 

  19. Wiesner, S.: Conjugate Coding (1970) (manuscript); subsequently published in SIGACT News 15(1), 78–88 (1983)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Maitra, A., Paul, G. (2012). Another Look at Symmetric Incoherent Optimal Eavesdropping against BB84. In: Galbraith, S., Nandi, M. (eds) Progress in Cryptology - INDOCRYPT 2012. INDOCRYPT 2012. Lecture Notes in Computer Science, vol 7668. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34931-7_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-34931-7_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-34930-0

  • Online ISBN: 978-3-642-34931-7

  • eBook Packages: Computer ScienceComputer Science (R0)