HOME

TheInfoList



OR:

The six-state protocol (SSP) is the
quantum cryptography Quantum cryptography is the science of exploiting quantum mechanical properties to perform cryptographic tasks. The best known example of quantum cryptography is quantum key distribution which offers an information-theoretically secure solutio ...
protocol that is the version of
BB84 BB84 is a quantum key distribution scheme developed by Charles Bennett and Gilles Brassard in 1984. It is the first quantum cryptography protocol. The protocol is provably secure, relying on two conditions: (1) the quantum property that inform ...
that uses a six-state polarization scheme on three orthogonal bases.


Origin

The six-state protocol first appeared in the article "Optimal Eavesdropping in Quantum Cryptography with Six States" by Dagmar Bruss in 1998, and was further studied in "Incoherent and coherent eavesdropping in the six-state protocol of quantum cryptography" by Pasquinucci and
Nicolas Gisin Nicolas Gisin (born 1952) is a Swiss physicist and professor at the University of Geneva working on the foundations of quantum mechanics, and quantum information and communication. His work includes both experimental and theoretical physics. He ...
in 1999.


Description

"The six-state protocol is a discrete-variable protocol for quantum key distribution that permits tolerating a noisier channel than the BB84 protocol." (2011, Abruzzo). SSP produces a higher rate of errors during attempted eavesdropping, thus making it easier to detect errors, as an eavesdropper must choose the right basis from three possible bases (Haitjema, 2016). High dimensional systems have been proven to provide a higher
level of security In cryptography, security level is a measure of the strength that a cryptographic primitive — such as a cipher or hash function — achieves. Security level is usually expressed as a number of "bits of security" (also security strength) ...
.


Implementation

Six-state protocol can be implemented without a quantum computer using only optical technologies. SSP's three conjugate bases span is shown on Picture 1.Kevin Garapo, Mhlambululi Mafu and Francesco Petruccione. Intercept-resend attack on six-state quantum key distribution over collective-rotation noise channels. Chinese Physics B, 25(7), 131-137, 2016. http://doi.org/10.1088/1674-1056/25/7/070303 Alice randomly generates a qubit string, encodes them using randomly chosen one of three bases, and sends string of qubits to Bob through the secured quantum channel. The probability of using one of the bases equals 1/3. After receiving the string of qubits, Bob also randomly chooses one of three bases for measuring the state of each qubits. Using classical insecure, but authenticated, channel Alice and Bob communicate and discard measurements where Bob used the different basis for measure the state of the qubit than basis that Alice used for encoding. States of qubits where encoding basis matched measurement basis used to determine the secret key.


See also

*
SARG04 SARG04 (named after Valerio Scarani, Antonio Acin, Gregoire Ribordy, and Nicolas Gisin) is a 2004 quantum cryptography protocol derived from the first protocol of that kind, BB84. Origin Researchers built SARG04 when they noticed that by using the ...
* E91quantum cryptographic communication protocol *
BB84 BB84 is a quantum key distribution scheme developed by Charles Bennett and Gilles Brassard in 1984. It is the first quantum cryptography protocol. The protocol is provably secure, relying on two conditions: (1) the quantum property that inform ...


References

{{quantum_computing Cryptographic algorithms Quantum information science Quantum cryptography Quantum cryptography protocols de:Quantenkryptografie#BB84-Protokoll