Talk:BB84
This article is rated Start-class on Wikipedia's content assessment scale. It is of interest to the following WikiProjects: | ||||||||||||||
|
Provably Secure
[edit]What does 'provably secure' mean here?
The protocol includes a 'check to see if more than a certain number of them agree'. How is this 'certain number' determined? Or can it be chosen freely? If it can be chosen freely, doesn't a lower number make the protocol 'less secure'? If so, how is the system 'provably secure' if it depends on such a choice? --Raboof (talk) 09:25, 5 July 2008 (UTC)
- The number is determined by security proofs, which basically say "if the error rate is , the maximum possible information Eve could have about the key is ". Provided the maximum information Eve could have is not 100%, then privacy amplification can be used to reduce Eve's information to an exponentially small amount. (Privacy amplification basically involves the key being distilled into a shorter key). The 'certain number' you mention corresponds to the error rate where Eve's information is 100%... if this is the case then no secure key can be distilled and transmission should be aborted.
- The security of BB84 has been proven in several ways, but the most widely cited proof is the Shor and Preskill one ([1]). In this Eve is allowed to carry out any attack allowed by quantum theory, and a secure key can be produced provided the error rate is less than 11%. The main Quantum Cryptography page contains more information on this.
- – centie (talk) 20:10, 7 September 2008 (UTC)
No discussion of man-in-the-middle? There's no such thing as ideal security in practice. 67.171.234.166 (talk) 00:56, 18 May 2009 (UTC)
- Quantum_cryptography#Man_in_the_middle_attack
- Of course 'ideal' is unattainable, but that doesn't mean we shouldn't try for as close as possible.
- - centie (talk) 18:02, 23 May 2009 (UTC)
Requirements for 'practical' use
[edit]To use this protocol, you'd need a 'quantum channel' to send the qubits over, which requires a dedicated fiber line between Alice and Bob, right? --Raboof (talk) 09:30, 5 July 2008 (UTC)
- Yep, a quantum channel is needed, which can be anything that preserves the quantum information your transmitting. A fiber line works for photons, but it doesn't necessarily have to be dedicated provided the multiplexed signals don't interfere with the quantum signal too much. Using free space as a channel (sending the photons through open air) also works quite well, one group's demonstrated this over 144 km and they next want to try it with a satellite ([2]).
- – centie (talk) 20:22, 7 September 2008 (UTC)
undefined symbols
[edit]Like all too many articles on quantum mechanics, general relativity, and other areas of advanced physics, this article uses symbols that are not meaningful to most readers. Okay, Alice sends . So what? What does mean?
You need to be a subject matter expert in order to understand this article, but if you already know QM and/or quantum cryptography, you don't need to read this article.
IMHO, articles of this sort should define any symbols not found in high school math or first year calculus. Or maybe even the calculus symbols should be defined. Bgoldnyxnet (talk) 15:22, 28 September 2011 (UTC)
This page is redundant
[edit]there is a much more thorough explanation on the quantum key distribution page. — Preceding unsigned comment added by 80.216.9.219 (talk) 21:52, 2 January 2012 (UTC)
Why was the paper withdrawn?
[edit]The first reference, doi:10.1016/j.tcs.2011.08.039, is listed as WITHDRAWN. Why was it withdrawn? Also, why is the year for this reference listed as 2011 rather than 1984? Dstahlke (talk) 22:41, 16 April 2014 (UTC)
Need to qualify "quantum" stuff
[edit]Sometimes something quantical does happen in practice, for example A two-qubit logic gate in silicon in 2015. Therefore, it is misleading to assume that the word quantum in a prominent position in the lede conveys that no key was ever distributed using this method. (Do quantum channels exist?)
I'd propose theoretical, but there must be a better adjective to convey that fact. Thanks ale (talk) 18:09, 21 May 2016 (UTC)
What about quantum storage?
[edit]Assuming quantum storage, I don't see how this unbreakable. Imagine, if instead of measuring b right away, Eve simply quantumly stores the qubit via quantum entanglement and waits for Alice to announce b, and Bob to communicate which b' values do not match. This tells Eve what b' to use to measure the store qubits. Since all the quantumly entangled qubits are now aligned with Bob's measurements, Eve learns a' simply by measuring the stored qubits. So now Alice, Bob, and Eve all know the same secret.Bill C. Riemers (talk) 19:04, 2 October 2017 (UTC)
Quantum key distribution explanation is better
[edit]This article could use some of the table and explanations from Quantum_key_distribution section on BB84.--ReyHahn (talk) 13:26, 26 May 2021 (UTC)
Final paragraph of Description
[edit]I’m a total non-expert reading this article. I thought maybe my confusion would be helpful in improving this page. I got confused as soon as I got to the final paragraph in the description of the protocol:
- From the remaining bits where both Alice and Bob measured in the same basis, Alice randomly chooses bits and discloses her choices over the public channel.
When did Alice measure something? I get from context that this means the bits where and agree, so does this mean where Bob's choice of basis (via the bits in ) matches Alice’s choice of basis (via the bits in )?
And then when Alice discloses bits, is she disclosing just the indices of those bits, or the bits together with their indices? Would these be bits of (on Alice's side) this tensor product , versus (on Bob's side) the mangled, eavesdropped, transmitted version ? Er, maybe on Alice's side it would be the result of her measurement of . Is that right?
- If this check passes, Alice and Bob proceed to use information reconciliation and privacy amplification techniques to create some number of shared secret keys.
They’re creating shared secret keys out of the bit string they've decided they both have a copy of. Is that right? — Preceding unsigned comment added by Yipe! That's me (talk • contribs) 20:35, 9 June 2021 (UTC)
- you're right, the wording was not clear: Alice does not "hold states" of "measure qubits" in the BB84 protocol: she prepares them and sends them to Bob, only keeping the classical bit strings b (denoting the bases used in preparation) and a (the bit values encoded. The Bob measures (with randomly chosen bases b'. Then Alice announces which bases she used (the string b), so that the two can now identify the indices of the bits for which the two bases are different. These are discarded. The remaining bits are used to check if the error rate is sufficiently low and the remaining ones are then a shard secret bit sequence (the information that Eve can have about it can be upper bounded), which can be further improved with standard techniques such as reconciliation and privacy amplification (provided the error rate was small enough).
- I hope the (slightly) rewritten paragraph is now clearer. --Qcomp (talk) 18:17, 10 June 2021 (UTC)
"Perfect implementation" needlessly repeated in introduction
[edit]It is stated in the 3rd sentence that "[t]he protocol is provably secure assuming a perfect implementation" and just a few sentences later that "[t]he proof of BB84 depends on a perfect implementation". I'd argue that the latter could be omitted, but as a non-native speaker without experience in the field I'll leave it for other to decide. 79.138.18.89 (talk) 01:57, 22 July 2024 (UTC)