### A QKD Protocol Extendable to Support Entanglement and Reduce Unauthorized Information Gain by Randomizing the Bases Lists with Key Values and Invalidate Explicit Privacy Amplification

R. Venkatesh, C. Sanjeevakumar, M. Kasi Rajan, L. Sudarsan, and N. Srinivasan

##### Abstract

This paper suggests an improvement to the BB84 scheme in Quantum key distribution. The original scheme has its weakness in letting quantifiably more information gain to an eavesdropper during public announcement of unencrypted bases lists. The security of the secret key comes at the expense of the final key length. We aim at exploiting the randomness of preparation (measurement) basis and the bit values encoded (observed), so as to randomize the bases lists before they are communicated over the public channel. A proof of security is given for our scheme and proven that our protocol results in lesser information gain by Eve in comparison with BB84 and its other extensions. Moreover, an analysis is made on the feasibility of our proposal as such and to support entanglement based QKD. The performance of our protocol is compared in terms of the upper and lower bounds on the tolerable bit error rate. We also quantify the information gain (by Eve) mathematically using the familiar approach of the concept of Shannon entropy. The paper models the attack by Eve in terms of interference in a multi-access quantum channel. Besides, this paper also hints at the invalidation of a separate privacy amplification step in the "prepare-and-measure" protocols in general.

Note: 13 pages and 1 figure

Available format(s)
Category
Cryptographic protocols
Publication info
Published elsewhere. published in arXiv archive, Cornell University ref no:quant-ph/0503024
Keywords
Quantum Key Distribution
Contact author(s)
sanmit_1983 @ yahoo com
History
Short URL
https://ia.cr/2005/080

CC BY

BibTeX

@misc{cryptoeprint:2005/080,
author = {R.  Venkatesh and C.  Sanjeevakumar and M.  Kasi Rajan and L.  Sudarsan and N.  Srinivasan},
title = {A QKD Protocol Extendable to Support Entanglement and Reduce Unauthorized Information Gain by Randomizing the Bases Lists with Key Values and Invalidate Explicit Privacy Amplification},
howpublished = {Cryptology ePrint Archive, Paper 2005/080},
year = {2005},
note = {\url{https://eprint.iacr.org/2005/080}},
url = {https://eprint.iacr.org/2005/080}
}

Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.