Share Email Print
cover

Proceedings Paper

Calculation of key reduction for B92 QKD protocol
Author(s): Miralem Mehic; Pavol Partila; Jaromir Tovarek; Miroslav Voznak
Format Member Price Non-Member Price
PDF $14.40 $18.00
cover GOOD NEWS! Your organization subscribes to the SPIE Digital Library. You may be able to download this paper for free. Check Access

Paper Abstract

It is well known that Quantum Key Distribution (QKD) can be used with the highest level of security for distribution of the secret key, which is further used for symmetrical encryption. B92 is one of the oldest QKD protocols. It uses only two non-orthogonal states, each one coding for one bit-value. It is much faster and simpler when compared to its predecessors, but with the idealized maximum efficiencies of 25% over the quantum channel. B92 consists of several phases in which initial key is significantly reduced: secret key exchange, extraction of the raw key (sifting), error rate estimation, key reconciliation and privacy amplification. QKD communication is performed over two channels: the quantum channel and the classical public channel. In order to prevent a man-in-the-middle attack and modification of messages on the public channel, authentication of exchanged values must be performed. We used Wegman-Carter authentication because it describes an upper bound for needed symmetric authentication key. We explained the reduction of the initial key in each of QKD phases.

Paper Details

Date Published: 21 May 2015
PDF: 7 pages
Proc. SPIE 9500, Quantum Information and Computation XIII, 95001J (21 May 2015); doi: 10.1117/12.2177149
Show Author Affiliations
Miralem Mehic, VŠB-Technical Univ. of Ostrava (Czech Republic)
Pavol Partila, VŠB-Technical Univ. of Ostrava (Czech Republic)
Jaromir Tovarek, VŠB-Technical Univ. of Ostrava (Czech Republic)
Miroslav Voznak, VŠB-Technical Univ. of Ostrava (Czech Republic)


Published in SPIE Proceedings Vol. 9500:
Quantum Information and Computation XIII
Eric Donkor; Andrew R. Pirich; Michael Hayduk, Editor(s)

© SPIE. Terms of Use
Back to Top