Quantum key distribution (QKD) protocols are used in
quantum key distribution
Quantum key distribution (QKD) is a secure communication method that implements a cryptographic protocol involving components of quantum mechanics. It enables two parties to produce a shared random secret key known only to them, which then can b ...
. The first protocol of that kind was
BB84
BB84 is a quantum key distribution scheme developed by Charles Bennett and Gilles Brassard in 1984. It is the first quantum cryptography protocol. The protocol is provably secure assuming a perfect implementation, relying on two conditions: (1) t ...
, introduced in 1984 by
Charles H. Bennett and
Gilles Brassard
Gilles Brassard is a faculty member of the Université de Montréal, where he has been a Full Professor since 1988 and Canada Research Chair since 2001.
Education and early life
Brassard received a Ph.D. in Computer Science from Cornell Univers ...
. After that, many other protocols have been defined.
List of quantum key distribution protocols
*
BB84
BB84 is a quantum key distribution scheme developed by Charles Bennett and Gilles Brassard in 1984. It is the first quantum cryptography protocol. The protocol is provably secure assuming a perfect implementation, relying on two conditions: (1) t ...
(1984) is a quantum key distribution scheme that allows two parties to securely communicate a private key for use in one-time pad encryption using the quantum property that information gain is only possible at the expense of disturbing the signal if the two states one is trying to distinguish are not orthogonal and an authenticated public classical channel.
*
E91 protocol (1991) is a quantum cryptography method that uses entangled pairs of photons to generate keys for secure communication, with the ability to detect any attempts at eavesdropping by an external party through the violation of Bell's Theorem and the preservation of perfect correlation between the measurements of the two parties.
*
BBM92 protocol
BBM92 is a quantum key distribution without Bell's theorem developed using polarized entangled photon pairs by Charles H. Bennett (physicist), Charles H. Bennett, Gilles Brassard and N. David Mermin in 1992. It is named after the trio's surnames a ...
(1992) is a quantum key distribution method that uses polarized entangled photon pairs and decoy states to securely transmit non-orthogonal quantum signals.
*
B92 protocol
B92 is a quantum key distribution (QKD) protocol developed by Charles Bennett in 1992. It is a simplified alternative to the BB84 protocol, using only two non-orthogonal quantum states rather than four. The protocol relies on the no-cloning theor ...
(1992) is a quantum key distribution method that uses entanglement distillation protocols to prepare and transmit nonorthogonal quantum states with unconditional security, even over lossy and noisy channels, by measuring the state on the Z basis and using local filtering and Z basis measurements to ensure the security of the transmission is determined by the number of errors and the number of filter pairs used.
*
MSZ96 MSZ96 is a quantum key distribution protocol which allows a cryptographic key bit to be encoded using four nonorthogonal quantum states described by non-commuting quadrature phase amplitudes of a weak optical field, without photon polarization (BB84 ...
protocol (1996) uses four nonorthogonal quantum states of a weak optical field to encode a cryptographic key bit without the use of photon polarization or entangled photons.
*
Six-state protocol The six-state protocol (SSP) is the quantum cryptography protocol that is the version of BB84 that uses a six-state polarization scheme on three orthogonal bases.
Origin
The six-state protocol first appeared in the article "Optimal Eavesdroppin ...
(1998) is a method of transmitting secure information using quantum cryptography that is more resistant to noise and easier to detect errors in compared to the BB84 protocol, due to its use of a six-state polarization scheme on three orthogonal bases and its ability to tolerate a noisier channel.
*
DPS protocol
DPS may refer to:
Arts and entertainment
* Dps (band), a Japanese alt rock band
* Damage per second, in video games
* ''Dead Poets Society'', a 1989 film
* The Dead Pop Stars, a Japanese hard rock band
* Double page spread, two facing pages in a ...
(2002) is a simple and efficient quantum key distribution (QKD) method that does not require a basis selection process like the traditional BB84 protocol, has a simpler receiver configuration with fewer detectors, uses efficient sequential pulses in the time domain for high key creation speed, and is robust against photon-number splitting attacks even with weak coherent light.
*
Decoy state protocol
Within quantum cryptography, the Decoy state quantum key distribution (QKD) protocol is the most widely implemented QKD scheme. Practical QKD systems use multi-photon sources, in contrast to the standard BB84 protocol, making them susceptible to ...
(2003) is a method used in practical quantum cryptography systems that uses multiple intensity levels at the transmitter's source and monitors bit error rates to detect and prevent photon number splitting attacks, enabling higher secure transmission rates or longer maximum channel lengths.
*
SARG04 SARG04 (named after Valerio Scarani, Antonio Acín, Gregoire Ribordy, and Nicolas Gisin) is a 2004 quantum cryptography protocol derived from the first protocol of that kind, BB84.
Origin
Researchers built SARG04 when they noticed that by using ...
(2004) is a quantum key distribution protocol that was developed as a more robust version of BB84, especially against photon-number-splitting attacks, for use with attenuated laser pulses in situations where the information is originated by a Poissonian source producing weak pulses and received by an imperfect detector.
*
COW protocol
Cattle (''Bos taurus'') are large, domesticated, bovid ungulates widely kept as livestock. They are prominent modern members of the subfamily Bovinae and the most widespread species of the genus ''Bos''. Mature female cattle are called cow ...
(2005) allows for secure communication between two parties by transmitting a key using weak coherent pulses of light and has advantages of requiring only a random number generator on the client side and being able to transmit key information at a high rate.
*
Three-stage quantum cryptography protocol The three-stage quantum cryptography protocol, also known as Kak's three-stage protocol is a method of data encryption that uses random polarization rotations by both Alice and Bob, the two authenticated parties, that was proposed by Subhash Kak. In ...
(2006) is a method of data encryption that uses random polarization rotations by the two authenticated parties, to continuously encrypt data using single photons and can also be used for exchanging keys, with the possibility of multi-photon quantum cryptography and the ability to address man-in-the-middle attacks through modification.
*
KMB09 protocol KMB09 protocol (named after Muhammad Mubashir Khan, Michael Murphy and Almut Beige) is an alternative quantum key distribution protocol, where Alice and Bob use two mutually unbiased bases with one of them encoding a ‘0’ and the other one encodi ...
(2009) allows for increased transmission distances between Alice and Bob by using two mutually unbiased bases and introducing a minimum index transmission error rate and quantum bit error rate, which is particularly effective for higher-dimensional photon states.
*
HDQKD
High-dimensional quantum key distribution (HDQKD) is a technology for secure communication between two parties. It allows for higher information efficiency than traditional binary quantum key distribution (QKD) protocols, which are limited to 1 bi ...
is a technology that enables secure communication between two parties by encoding quantum information in high dimensions, such as optical angular momentum modes, and transmitting it over long distances through multicore fibers or free-space links.
*
T12 protocol aims to increase the practicality of QKD by removing certain idealizations and including features that can increase the key rate of the system.
References
{{quantum information
Quantum cryptography