Abstract
In this article we present the BB84 quantum key distribution scheme from two perspectives. First, we provide a theoretical discussion of the steps Alice and Bob take to reach a shared secret using this protocol, while an eavesdropper Eve is either involved or not. Then, we offer and discuss two distinct implementations that simulate BB84 using IBM’s Qiskit framework, the first being an exercise solved during the “IBM Quantum Challenge” event in early May 2020, while the other was developed independently to showcase the intercept-resend attack strategy in detail. We note the latter’s scalability and increased output verbosity, which allow for a statistical analysis to determine the probability of detecting the act of eavesdropping.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Hughes, R.J., et al.: Quantum cryptography. Contemporary Phys. 36(3), 149–163 (1995). https://doi.org/10.1080/00107519508222149.eprint
Shor, P.W., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85, 441–444 (2000). https://doi.org/10.1103/PhysRevLett.85.441
Renner, R., Gisin, N., Kraus, B.: Information-theoretic security proof for quantum-key-distribution protocols. Phys. Rev. A 72, 012332 (2005). https://doi.org/10.1103/PhysRevA.72.012332
Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers, Systems, and Signal Processing, pp. 175–179, December 1984
Bennett, C.H., Brassard, G.: Experimental quantum cryptography: the dawn of a new era for quantum cryptography: the experimental prototype is working. In: SIGACT News 20.4, pp. 78–80, November 1989. ISSN: 0163–5700. https://doi.org/10.1145/74074.74087
Liao, S.-K., et al.: Satellite-to-ground quantum key distribution. Nature 549(7670), 43–47 (2017)
Boaron, A., et al. Secure quantum key distribution over 421 km of optical fiber. Phys. Rev. Lett. 121, 190502 (2018). https://doi.org/10.1103/PhysRevLett.121.190502
Chen, J.-P., et al.: Sending-or-not-sending with independent lasers: secure twin-field quantum key distribution over 509 km. Phys. Rev. Lett. 124, 070501 (2020). https://doi.org/10.1103/PhysRevLett.124.070501
Wootters, W.K., Zurek, W.H.: A single quantum cannot be cloned. Nature 299(5886), 802–803 (1982)
Dieks, D.: Communication by EPR devices. Phys. Lett. A 92(6), 271–272 (1982). ISSN: 0375–9601. https://doi.org/10.1016/0375-9601(82)90084-6, http://www.sciencedirect.com/science/article/pii/0375960182900846
Bennett, C.H., Bessette, F., Brassard, G., Salvail, L., Smolin, J.: Experimental quantum cryptography. J. Cryptol. 5(1), 3–28, (1992). ISSN: 1432-1378. https://doi.org/10.1007/BF00191318
IBM Quantum Challenge announcement. https://www.ibm.com/blogs/research/2020/04/ibm-quantum-challenge/
Abraham, H., et al.: Qiskit: An Open-source Framework for Quantum Computing (2019). https://doi.org/10.5281/zenodo.2562110
IBM Quantum Challenge BB84 exercise. https://github.com/qiskitcommunity/may4challengeexercises/blob/master/ex03/Challenge3BB84.ipynb
IBM Quantum Challenge repository. https://github.com/qiskit-community/may4challengeexercises
Acknowledgements
We acknowledge the use of IBM Quantum services for this work. The views expressed are those of the authors, and do not reflect the official policy or position of IBM or the IBM Quantum team.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
A Qiskit Source Code and Output
A Qiskit Source Code and Output
1.1 A.1 “IBM Quantum Challenge”
1.2 A.2 Simulation of Intercept-Resend Attack
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Mina, MZ., Simion, E. (2021). A Scalable Simulation of the BB84 Protocol Involving Eavesdropping. In: Maimut, D., Oprina, AG., Sauveron, D. (eds) Innovative Security Solutions for Information Technology and Communications. SecITC 2020. Lecture Notes in Computer Science(), vol 12596. Springer, Cham. https://doi.org/10.1007/978-3-030-69255-1_7
Download citation
DOI: https://doi.org/10.1007/978-3-030-69255-1_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-69254-4
Online ISBN: 978-3-030-69255-1
eBook Packages: Computer ScienceComputer Science (R0)