Who invented BB84?

3. Protocols Utilizing Heisenberg’s Uncertainty Principle. In 1984 Charles Bennett and Gilles Brassard published the first QKD protocol [BB84]. It was based on Heisenberg’s Uncertainty Principle and is simply known as the BB84 protocol after the authors names and the year in which it was published.

What principle is BB84 based on?

2.2. BB84 is based on ‘uncertainty principle’ which states that unlike digital data the quantum data cannot be copied or measured without disturbing it. This immediately intimates that the eavesdropper cannot gain even a partial data without altering it.

Is BB84 secure?

Abstract. We prove that the 1984 protocol of Bennett and Brassard (BB84) for quantum key distribution is secure. We first give a key distribution protocol based on entanglement purification, which can be proven secure using methods from Lo and Chau’s proof of security for a similar protocol.

Why is BB84 secure?

These theorems reduce Eve’s general attacks to collective attacks if the protocol has a permutation symmetry, which is just the case for the BB84 protocol. Hence, the security of BB84 under general attacks can be obtained from that under collective attacks.

Does BB84 require entanglement?

BB84 was originally described using photon polarization states; no quantum entanglement was required.

How many control random bits are used in the BB84 protocol?

In the BB84 protocol, there are two binary input bits x1 and x0 in Alice’s side, which can be used to select the state preparation bases and encoding classical bits respectively.

What is difference between BB84 and E91 protocol?

Compared with the BB84 protocol which Alice sends quantum particles to Bob, the E91 protocol uses an EPR pair during the communication, which divides the EPR pair and sends one particle to Alice and Bob separately.

Is quantum key distribution useless?

Noted security expert Bruce Schneier remarked that quantum key distribution is “as useless as it is expensive”. Quantum key distribution is only used to produce and distribute a key, not to transmit any message data.