%0 Journal Article
%T Modification of B92 protocol and the proof of its unconditional security
B92量子密钥分配协议的变形及其无条件安全性证明
%A Zhang Quan
%A Tang Chao-Jing
%A Zhang Shen-Qiang
%A
张权
%A 唐朝京
%A 张森强
%J 物理学报
%D 2002
%I
%X Shor and Preskill's method with which thy proved the unconditional security of BB84 quantum key distribution protocol was analyzed first. We also indicated that their method could not be applied to prove the unconditional security of B92 scheme directly. In order to take advantage of Shor Preskill's techniques in their proof of the unconditional security of BB84, we have introduced in this paper a transformation that can exchange between BB84 and B92. By proving that the transformed B92 protocol leaks no more information to eavesdropper, we demonstrate the unconditional security of B92. We also solve the problem how to prove the unconditional security of B92 with Shor Preskill's method.
%K B92 protocal
%K CSS code
%K QKD
%K quantum information
B92协议
%K CSS码
%K 量子密钥分配
%K 量子信息
%U http://www.alljournals.cn/get_abstract_url.aspx?pcid=6E709DC38FA1D09A4B578DD0906875B5B44D4D294832BB8E&cid=47EA7CFDDEBB28E0&jid=29DF2CB55EF687E7EFA80DFD4B978260&aid=8E0954AD0B3E0614&yid=C3ACC247184A22C1&vid=987EDA49D8A7A635&iid=DF92D298D3FF1E6E&sid=794F46304592E8E6&eid=6EAE3EAEEC5D0463&journal_id=1000-3290&journal_name=物理学报&referenced_num=2&reference_num=12