Abstract

When a quantum cryptographic system operates in the presence of background noise, security of the key can be recovered by a procedure called key distillation. A key-distillation scheme effective against so-called individual (bitwise-independent) eavesdropping attacks involves sacrifice of some of the data through privacy amplification. We derive the amount of data sacrifice sufficient to defend against individual eavesdropping attacks in both BB84 and B92 protocols and show in what sense the communication becomes secure as a result. We also compare the secrecy capacity of various quantum cryptosystems, taking into account data sacrifice during key distillation, and conclude that the BB84 protocol may offer better performance characteristics than the B92.

© 1998 Optical Society of America

Full Article  |  PDF Article
OSA Recommended Articles
High-speed data encryption over 25 km of fiber by two-mode coherent-state quantum cryptography

Eric Corndorf, Geraldo Barbosa, Chuang Liang, Horace P. Yuen, and Prem Kumar
Opt. Lett. 28(21) 2040-2042 (2003)

Mixed basis quantum key distribution with linear optics

Mladen Pavičić, Oliver Benson, Andreas W. Schell, and Janik Wolters
Opt. Express 25(20) 23545-23555 (2017)

100 km differential phase shift quantum key distribution experiment with low jitter up-conversion detectors

Eleni Diamanti, Hiroki Takesue, Carsten Langrock, M. M. Fejer, and Yoshihisa Yamamoto
Opt. Express 14(26) 13073-13082 (2006)

References

You do not have subscription access to this journal. Citation lists with outbound citation links are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Cited By

You do not have subscription access to this journal. Cited by links are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Figures (5)

You do not have subscription access to this journal. Figure files are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Equations (26)

You do not have subscription access to this journal. Equations are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Metrics

You do not have subscription access to this journal. Article level metrics are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription