Improving BB84 Efficiency with Delayed Measurement via Quantum Memory (2410.21191v1)
Abstract: In this paper, we introduce a novel modification to the BB84 Quantum Key Distribution (QKD) protocol, aimed at enhancing its efficiency through the use of quantum memory and delayed measurement. In the standard BB84 protocol, the receiver immediately measures the qubits sent by the sender using randomly chosen bases. Due to mismatches between the sender and receiver's bases, a significant portion of the qubits are discarded, reducing the overall key generation rate. Our proposed protocol allows the receiver to store the received qubits in quantum memory and defer measurement until after the sender reveals her basis choices, effectively eliminating the need to discard mismatched qubits. This modification improves the key generation efficiency while maintaining the core security features of the standard BB84 protocol. By avoiding the unnecessary loss of qubits, our protocol achieves a higher secret key rate without introducing additional vulnerabilities. We present a detailed step-by-step explanation of the delayed measurement process. Although this approach does not alter the security guarantees of BB84, it represents a significant improvement in efficiency, making the protocol more viable for large-scale quantum communication networks.
- Quantum cryptography: Public key distribution and coin tossing. Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, pages 175–179, 1984.
- Privacy amplification by public discussion. SIAM Journal on Computing, 17(2):210–229, 1988.
- Prospective applications of optical quantum memories. Journal of Modern Optics, 60(18):1519–1537, 2013.
- Quantum cryptography. Reviews of Modern Physics, 74(1):145–195, 2002.
- Quantum memories: emerging applications and recent advances. Journal of Modern Optics, 63(20):2005–2028, 2016.
- Decoy state quantum key distribution. Physical Review Letters, 94(23):230504, 2005.
- Optical quantum memory. Nature Photonics, 3(12):706–714, 2009.
- Dominic Mayers. Unconditional security in quantum cryptography. Journal of the ACM, 48(3):351–406, 2001.
- Information-theoretic security proof for quantum-key-distribution protocols. Physical Review Letters, 95(8):080501, 2005.
- Quantum repeaters based on atomic ensembles and linear optics. Reviews of Modern Physics, 83(1):33–80, 2011.
- The security of practical quantum key distribution. Reviews of Modern Physics, 81(3):1301–1350, 2009.
- A single quantum cannot be cloned. Nature, 299(5886):802–803, 1982.
- Quantum key distribution with imperfect devices. Physical Review A, 78(4):042333, 2008.