BB84[1][2] is a quantum key distribution scheme developed by Charles Bennett and Gilles Brassard in 1984. It is the first quantum cryptography protocol.[3] The protocol is provably secure assuming a perfect implementation, relying on two conditions: (1) the quantum property that information gain is only possible at the expense of disturbing the signal if the two states one is trying to distinguish are not orthogonal (see no-cloning theorem); and (2) the existence of an authenticated public classical channel.[4] It is usually explained as a method of securely communicating a private key from one party to another for use in one-time pad encryption.[5]
The proof of BB84 depends on a perfect implementation. Side channel attacks exist, taking advantage of non-quantum sources of information. Since this information is non-quantum, it can be intercepted without measuring or cloning quantum particles.[6]
^C. H. Bennett and G. Brassard. "Quantum cryptography: Public key distribution and coin tossing". In Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, volume 175, page 8. New York, 1984. http://researcher.watson.ibm.com/researcher/files/us-bennetc/BB84highest.pdf Archived 2020-01-30 at the Wayback Machine
^Bennett, Charles H.; Brassard, Gilles (2014-12-04). "Quantum cryptography: Public key distribution and coin tossing". Theoretical Computer Science. Theoretical Aspects of Quantum Cryptography – celebrating 30 years of BB84. 560, Part 1: 7–11. arXiv:2003.06557. doi:10.1016/j.tcs.2014.05.025.
^Branciard, Cyril; Gisin, Nicolas; Kraus, Barbara; Scarani, Valerio (2005). "Security of two quantum cryptography protocols using the same four qubit states". Physical Review A. 72 (3): 032301. arXiv:quant-ph/0505035. Bibcode:2005PhRvA..72c2301B. doi:10.1103/PhysRevA.72.032301. S2CID 53653084.
^Quantum Computing and Quantum Information, Michael Nielsen and Isaac Chuang, Cambridge University Press 2000
^Dixon, A. R., Dynes, J. F., Lucamarini, M., Fröhlich, B., Sharpe, A. W., Plews, A., Tam, W., Yuan, Z. L., Tanizawa, Y., Sato, H., Kawamura, S., Fujiwara, M., Sasaki, M., & Shields, A. J. (2017). Quantum key distribution with hacking countermeasures and long term field trial. Scientific Reports, 7, 1978.
BB84 is a quantum key distribution scheme developed by Charles Bennett and Gilles Brassard in 1984. It is the first quantum cryptography protocol. The...
described below both use discrete variable coding. This protocol, known as BB84 after its inventors and year of publication, was originally described using...
the first protocol of that kind, BB84. Researchers built SARG04 when they noticed that by using the four states of BB84 with a different information encoding...
simpler version of BB84. The main difference between B92 and BB84: B92 only needs two states BB84 needs 4 polarization states Like the BB84, Alice transmits...
that kind was BB84, introduced in 1984 by Charles H. Bennett and Gilles Brassard. After that, many other protocols have been defined. BB84 (1984) is a quantum...
last Mallets built in Europe. Four 0-4-4-2T locomotives numbered BB81 to BB84 were built by Nippon Sharyo in 1962 for the Indonesian State Railways' 750 mm...
distribution protocols, most famously BB84 by Charles H. Bennett and Gilles Brassard and E91 by Artur Ekert. Although BB84 does not use entanglement, Ekert's...
B92 uses only two states instead of four states used by E91 protocol and BB84 It is used for non orthogonal quantum transmission 0 can be encrypted as...
Practical QKD systems use multi-photon sources, in contrast to the standard BB84 protocol, making them susceptible to photon number splitting (PNS) attacks...
Diffie–Hellman key exchange. Methods from the area of quantum cryptography (like BB84 key exchange protocol) and the area of post-quantum cryptography (like McEliece...
the laboratory. In 1984, together with Charles H. Bennett, he invented the BB84 protocol for quantum cryptography. He later extended this work to include...
basis. An example of usage of an alternative measurement basis is in the BB84 cipher. If two quantum states (i.e. qubits, or registers) are entangled (meaning...
resistant to eavesdropping. Quantum key distribution (QKD) protocols, such as BB84, enable the secure exchange of cryptographic keys between parties, ensuring...