Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
157 tokens/sec
GPT-4o
8 tokens/sec
Gemini 2.5 Pro Pro
46 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Improving BB84 Efficiency with Delayed Measurement via Quantum Memory (2410.21191v1)

Published 28 Oct 2024 in quant-ph and cs.CR

Abstract: In this paper, we introduce a novel modification to the BB84 Quantum Key Distribution (QKD) protocol, aimed at enhancing its efficiency through the use of quantum memory and delayed measurement. In the standard BB84 protocol, the receiver immediately measures the qubits sent by the sender using randomly chosen bases. Due to mismatches between the sender and receiver's bases, a significant portion of the qubits are discarded, reducing the overall key generation rate. Our proposed protocol allows the receiver to store the received qubits in quantum memory and defer measurement until after the sender reveals her basis choices, effectively eliminating the need to discard mismatched qubits. This modification improves the key generation efficiency while maintaining the core security features of the standard BB84 protocol. By avoiding the unnecessary loss of qubits, our protocol achieves a higher secret key rate without introducing additional vulnerabilities. We present a detailed step-by-step explanation of the delayed measurement process. Although this approach does not alter the security guarantees of BB84, it represents a significant improvement in efficiency, making the protocol more viable for large-scale quantum communication networks.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (13)
  1. Quantum cryptography: Public key distribution and coin tossing. Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, pages 175–179, 1984.
  2. Privacy amplification by public discussion. SIAM Journal on Computing, 17(2):210–229, 1988.
  3. Prospective applications of optical quantum memories. Journal of Modern Optics, 60(18):1519–1537, 2013.
  4. Quantum cryptography. Reviews of Modern Physics, 74(1):145–195, 2002.
  5. Quantum memories: emerging applications and recent advances. Journal of Modern Optics, 63(20):2005–2028, 2016.
  6. Decoy state quantum key distribution. Physical Review Letters, 94(23):230504, 2005.
  7. Optical quantum memory. Nature Photonics, 3(12):706–714, 2009.
  8. Dominic Mayers. Unconditional security in quantum cryptography. Journal of the ACM, 48(3):351–406, 2001.
  9. Information-theoretic security proof for quantum-key-distribution protocols. Physical Review Letters, 95(8):080501, 2005.
  10. Quantum repeaters based on atomic ensembles and linear optics. Reviews of Modern Physics, 83(1):33–80, 2011.
  11. The security of practical quantum key distribution. Reviews of Modern Physics, 81(3):1301–1350, 2009.
  12. A single quantum cannot be cloned. Nature, 299(5886):802–803, 1982.
  13. Quantum key distribution with imperfect devices. Physical Review A, 78(4):042333, 2008.

Summary

We haven't generated a summary for this paper yet.

X Twitter Logo Streamline Icon: https://streamlinehq.com