Paper 2011/588
Another Look at Symmetric Incoherent Optimal Eavesdropping against BB84
Arpita Maitra and Goutam Paul
Abstract
The BB84 protocol is used by Alice (the sender) and Bob (the receiver) to settle on a secret classical bit-string by communicating qubits over an insecure quantum channel where Eve (the Eavesdropper) can have access. In this paper, we revisit a well known eavesdropping technique against BB84. We claim that there exist certain gaps in understanding the existing eavesdropping strategy in terms of cryptanalytic view and we try to bridge those gaps in this paper. First we refer to the result where it is shown that in the six-state variant of the BB84 protocol (Bru\ss, Phys. Rev. Lett., 1998), the mutual information between Alice (the sender) and Eve (the eavesdropper) is higher when two-bit probe is used compared to the one-bit probe and hence the two-bit probe provides a stronger eavesdropping strategy. However, from cryptanalytic point of view, we show that Eve has the same success probability in guessing the bit transmitted by Alice in both the cases of the two-bit and the one-bit probe. Thus, we point out that having higher mutual information may not directly lead to obtaining higher probability in guessing the key bit. It is also explained in the work of Bru\ss~that the six-state variant of the BB84 protocol is more secure than the traditional four-state BB84. We look into this point in more detail and identify that this advantage is only achieved at the expense of communicating more qubits in the six-state protocol. In fact, we present different scenarios, where given the same number of qubits communicated, the security comparison of the four and six-state protocols is evaluated carefully.
Note: This is a substantially revised version (with a slight change in title) that has been accepted for presentation in INDOCRYPT 2012.
Metadata
- Available format(s)
- Publication info
- Published elsewhere. Accepted in INDOCRYPT 2012
- Keywords
- AdvantageBB84Key DistributionOptimal EavesdroppingQuantum Cryptography
- Contact author(s)
- goutam paul @ ieee org
- History
- 2012-11-08: last of 5 revisions
- 2011-11-03: received
- See all versions
- Short URL
- https://ia.cr/2011/588
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2011/588, author = {Arpita Maitra and Goutam Paul}, title = {Another Look at Symmetric Incoherent Optimal Eavesdropping against {BB84}}, howpublished = {Cryptology {ePrint} Archive, Paper 2011/588}, year = {2011}, url = {https://eprint.iacr.org/2011/588} }