Title: Stefano Mancini
1 The adventures of Alice, Bob Eve in the
Quantumland
University of Camerino, Italy
2Outline (part 3)
- Security of BB84 against symmetric individual
attacks - Other QKD protocols and their security
- The ultimate security proof
3The problem of security
- Show that exists a nonzero (positive) bound for
tolerable QBER - Such a bound should come from the conditions of
KCs theorem - H(ab)gtH(ae) or H(ab)gtH(be)
4Symmetric Individual Attacks
A
B
qubit
U
probe
E
E
5Security against symmetric individual attacks
6F
7 8(No Transcript)
9Security conditions
10B92 protocol
11b1 implies perfect anticorrelations
b
usable bits
_____________________________
R
( transmitted qubits)( transmitted bits)
R 1/8
12E91 protocol
13b
a
ab implies perfect correlations
usable bits
_____________________________
R
( transmitted qubits)( transmitted bits)
R 1/6
14Security of E91 protocol
Equivalence between E91 BB84
15The ultimate security proof
16(No Transcript)
17Experimental Quantum Cryptography
- First demonstration on a table at IBM labs over a
distance of 30 cm (1989) - Experiments with fibres (over a distance of 30-50
Km, 1996-2004) using faint laser pulses or
entangled photons - Experiments in free space (over a distance of few
Km) - Quantum Cryptography Devices already available in
the market!