190 likes | 389 Views
The adventures of Alice, Bob & Eve in the Quantumland. Stefano Mancini. University of Camerino, Italy. Outline (part 3). Security of BB84 against symmetric individual attacks Other QKD protocols and their security The ultimate security proof. The problem of security.
E N D
The adventures of Alice, Bob & Eve in the Quantumland Stefano Mancini University of Camerino, Italy
Outline (part 3) • Security of BB84 against symmetric individual attacks • Other QKD protocols and their security • The ultimate security proof
The problem of security • Show that exists a nonzero (positive) bound for tolerable QBER • Such a bound should come from the conditions of KC’s theorem H(a:b)>H(a:e) or H(a:b)>H(b:e)
Symmetric Individual Attacks A B qubit U probe E E
˜ ˜ ˜ ˜ ˜ ˜ ˜ ˜
b=1 implies perfect anticorrelations b’ # usable bits _____________________________ R= (# transmitted qubits)+(# transmitted bits) R= 1/8
a’ b a’=b’ implies perfect correlations # usable bits _____________________________ R= (# transmitted qubits)+(# transmitted bits) R= 1/6
Security of E91 protocol | | Equivalence between E91 & BB84
Experimental Quantum Cryptography • First demonstration on a table at IBM labs over a distance of 30 cm (1989) • Experiments with fibres (over a distance of 30-50 Km, 1996-2004) using faint laser pulses or entangled photons • Experiments in free space (over a distance of few Km) • Quantum Cryptography Devices already available in the market!