BB84 protocol

BB84 is a quantum key distribution protocol that is based on photon polarisation states. It was invented by Charles Bennett and Gilles Brassard in 1984. The protocol can be broken down into the following steps:

1) The sender transmits a raw key in the form of a string of photons via an optical fibre to the receiver. Each photon is randomly chosen by the sender to be polarised along one of four directions: i) z-direction or \updownarrow  (\theta=0^{\circ}), ii) x-direction or \leftrightarrow (\theta=90^{\circ}), iii) ⤢ (\theta=45^{\circ}), iv) ⤡ (\theta=-45^{\circ}). This can be accomplished by passing photons generated by a laser L through an attenuator A (a material that reduces the intensity of the laser beam through absorption or reflection to produce single photons), followed by a birefringent crystal B_1 to separate photons into two orthogonal polarisations, one of which is passed through a Pockels cell P_1 for the appropriate rotations (see diagram below).

2) The polarised photons are assigned the following qubit values: \updownarrow=0, \leftrightarrow=1, ⤢ = 0, ⤡ = 1, which can be grouped into the following bases:

Basis 0 1
+ \updownarrow \leftrightarrow
\times

3) The receiver, using Pockels cell B_2, randomly selects one of two rotations (90^{\circ} representing the basis +, or 45^{\circ} representing the basis \times) to analyse each photon sent by the sender. The outputs of the detectors D_1 and D_2 are set to 1 and 0 respectively.

Assuming a raw key of twelve bits are sent, we may have the following:

Sender Polarisation \small \updownarrow \small \leftrightarrow \small \leftrightarrow \small \leftrightarrow \small \updownarrow \small \updownarrow \small \leftrightarrow
Qubit value 0 1 1 1 0 1 0 0 1 1 0 1
Receiver Basis \small + \small + \small \times \small + \small + \small \times \small \times \small \times \small \times \small + \small \times \small +
Qubit value 0 1 1 0 0 0 0 0 1 1 1 1
Retained qubits 0 1 0 1 1

1) The sender and receiver share their bases with each other publicly (e.g. over the internet).

2) Only the qubits corresponding to polarisations with the same basis are retained. To complete the protocol, all other qubits can be converted to 0. The final key in the above example is 010000001001, which is used to encrypt a message (assuming of the same qubit-length) using modular addition.

Let’s suppose a third party intercepts the sender’s qubits and measures them using the same method as the receiver. The interceptor then has to guess the sender’s polarisation for each measured qubit and resend them to the receiver (see table below). Since the interceptor does not know the bases selected by the sender, the bits he measured are only useful if he is lucky enough to choose the same bases for the qubits that the sender and receiver eventually retained.

Sender Polarisation \small \updownarrow \small \leftrightarrow \small \leftrightarrow \small \leftrightarrow \small \updownarrow \small \updownarrow \small \leftrightarrow
Qubit value 0 1 1 1 0 1 0 0 1 1 0 1
Interceptor Basis \small \times \small + \small \times \small \times \small + \small + \small + \small \times \small + \small + \small \times \small \times
Qubit value 0 1 0 1 1 1 0 1 0 0 0 1
Resends \small \leftrightarrow \small \leftrightarrow \small \leftrightarrow \small \updownarrow \small \updownarrow \small \updownarrow
Receiver Basis \small + \small + \small \times \small + \small + \small \times \small \times \small \times \small \times \small + \small \times \small +
Qubit value 1 1 0 0 1 0 0 1 0 0 0 1
Retained qubits 1 1 0 0 1
Discrepancies Y N N Y N

To detect the presence of an interceptor, the sender and receiver share pre-determined segments of qubits with each other. The probability that the sender and receiver select the same bases but the interceptor chooses different bases is \small \frac{1}{4}, of which half the time the interceptor resend polarisations of the ‘wrong’ basis to the receiver. Therefore, the probability of the sender and the receiver detecting discrepancies in the retained qubits when they share segments of their qubit values is \small \frac{1}{8} (assuming the shared qubits are representative of a randomly selected segment), which is very significant if the qubit-length of the raw key is relatively long. For example, if the raw key has 72 qubits, of which 40 common qubits are eventually shared between the sender and the receiver, 5 retained qubits will be erroneous. When discrepancies are detected, the sender and receiver will discard the key and start over.

 

 

Next article: exchange operator
Previous article: Photon polarisation
Content page of quantum mechanics
Content page of advanced chemistry
Main content page

Leave a Reply

Your email address will not be published. Required fields are marked *