BB84
BB84 is a scheme developed by and in 1984. It is the first . The protocol is , relying on the quantum property that information gain is only possible at the expense of disturbing the signal if the two states one is trying to distinguish are not orthogonal (see ). It is usually explained as a method of securely communicating a private key from one party to another for use in encryption.
Description
In the BB84 scheme, wishes to send a private key to . She begins with two strings of bits, and
, each
bits long. She then encodes these two strings as a string of
qubits:
where and
are the
-th bits of
and
respectively. Together,
give us an index into the following four qubit states:
Note that the bit is what decides which basis
is encoded in (either in the computational basis or the Hadamard basis). The qubits are now in states that are not mutually orthogonal, and thus it is impossible to distinguish all of them with certainty without knowing
.
Alice sends over a public and authenticated
to Bob. Bob receives a state
, where
represents both the effects of noise in the channel and eavesdropping by a third party we’ll call Eve. After Bob receives the string of qubits, all three parties, namely Alice, Bob and Eve, have their own states. However, since only Alice knows
, it makes it virtually impossible for either Bob or Eve to distinguish the states of the qubits. Also, after Bob has received the qubits, we know that Eve cannot be in possession of a copy of the qubits sent to Bob, by the , unless she has made measurements. Her measurements, however, risk disturbing a particular qubit with probability ½ if she guesses the wrong basis.
Bob proceeds to generate a string of random bits of the same length as
and then measures the string he has received from Alice,
. At this point, Bob announces publicly that he has received Alice’s transmission. Alice then knows she can now safely announce
. Bob communicates over a public channel with Alice to determine which
and
are not equal. Both Alice and Bob now discard the qubits in
and
where
and
do not match.
From the remaining bits where both Alice and Bob measured in the same basis, Alice randomly chooses
bits and discloses her choices over the public channel. Both Alice and Bob announce these bits publicly and run a check to see whether more than a certain number of them agree. If this check passes, Alice and Bob proceed to use techniques to create some number of shared secret keys. Otherwise, they cancel and start over.
See Also on BitcoinWiki
- – communication protocol