Enhancements to Prepare-and-Measure Based QKD Protocols

Peter Y.A. Ryan, B. Christianson

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

We propose some simple changes to a class of Quantum Key Distribution protocols. The first enhancement ensures early detection of any attempted Man-in-the-Middle attack and results in less leakage of key material to any eavesdropping attacker. We argue that this version is at least as secure as the original BB’84 scheme, but ensures a closer binding of the key establishment and authentication components of the protocol. Further proposed enhancements lead to a doubling of the key rate, but the security arguments become more delicate.
We also touch on the need to enhance the models used to analyze both the classical and quantum aspects of QKD protocols. This is prompted by the observation that existing analyses treat the quantum (key-establishment) and classical (authentication etc) phases separately and then combine them in a simple-minded fashion.
Original languageEnglish
Title of host publicationSecurity Protocols XXI
PublisherSpringer Nature Link
Pages123-133
ISBN (Electronic)978-3-642-41717-7
ISBN (Print)978-3-642-41716-7
DOIs
Publication statusPublished - 2013
EventThe Twenty-first International Workshop on Security Protocols - Cambridge, United Kingdom
Duration: 19 Mar 201320 Mar 2013

Publication series

NameLecture Notes in Computer Science
Volume8263

Conference

ConferenceThe Twenty-first International Workshop on Security Protocols
Country/TerritoryUnited Kingdom
CityCambridge
Period19/03/1320/03/13

Fingerprint

Dive into the research topics of 'Enhancements to Prepare-and-Measure Based QKD Protocols'. Together they form a unique fingerprint.

Cite this