The asymptotic error rate thresholds found in this
paper are more flexible than in BB84, because they
allow us to tolerate a higher threshold for a specific
basis (say, the x basis) if we demand a lower thresh-
old for the other basis (z). If we choose the same er-
ror rate threshold for both bases, then the asymptotic
bound is 7.56%, exactly the bound found for BB84 in
BBBMR06 and BGM09.
We conclude that even if we change the BB84 pro-
tocol to have INFO bits only in the z basis, this does
not harm its security and reliability (at least against
collective attacks). This does not even change the
asymptotic error rate threshold, and allows more flex-
ibility when choosing the thresholds for both bases.
The only drawbacks of this change are the need to
check the error rate for the two bases separately, and
the need to either send more qubits (3n qubits in total,
rather than 2n) or get a slower exponential decrease
of the exponents required for security and reliability.
We thus find that the feature of BB84, that both
bases are used for information, is not very impor-
tant for security and reliability, and that BB84-INFO-
z (that lacks this feature) is almost as useful as BB84.
This may have important implications on the security
and reliability of other protocols that also only use one
basis for information qubits, as done in some two-way
protocols.
We also present a better approach for the proof,
that uses a quantum distance between two states
rather than the classical information. In BGM09,
BBBGM02, and BBBMR06, the classical mutual in-
formation between Eve’s information (after an opti-
mal measurement) and the final key was calculated
(by using the trace distance between two quantum
states); although we should note that in BGM09 and
BBBMR06, the trace distance was used for the proof
of security of a single bit of the final key even when all
other bits are given to Eve, and only the last stages of
the proof discussed bounding the classical mutual in-
formation. In the current paper, on the other hand, we
use the trace distance between the two quantum states
until the end of the proof, which avoids composability
problems that existed in the previous works.
Therefore, this proof makes a step towards making
BGM09, BBBGM02, and BBBMR06 prove compos-
able security of BB84 (namely, security even if Eve
keeps her quantum states until she gets more infor-
mation when Alice and Bob use the key, rather than
measuring them in the end of the protocol). This ap-
proach also applies (similarly) to the BB84 security
proof in BGM09.
ACKNOWLEDGEMENTS
The work of TM and RL was partly supported by the
Israeli MOD Research and Technology Unit.
REFERENCES
Bennett, C. H. and Brassard, G. (1984). Quantum cryptog-
raphy: Public key distribution and coin tossing. In In-
ternational Conference on Computers, Systems & Sig-
nal Processing, IEEE, 1984, pages 175–179.
Biham, E., Boyer, M., Boykin, O. P., Mor, T., and Roy-
chowdhury, V. (2006). A proof of the security of quan-
tum key distribution. J. Cryptol., 19(4):381–439.
Biham, E., Boyer, M., Brassard, G., van de Graaf, J.,
and Mor, T. (2002). Security of quantum key dis-
tribution against all collective attacks. Algorithmica,
34(4):372–388.
Biham, E. and Mor, T. (1997a). Bounds on information
and the security of quantum cryptography. Phys. Rev.
Lett., 79:4034–4037.
Biham, E. and Mor, T. (1997b). Security of quantum cryp-
tography against collective attacks. Phys. Rev. Lett.,
78:2256–2259.
Boyer, M., Gelles, R., and Mor, T. (2009). Security of
the bennett-brassard quantum key distribution proto-
col against collective attacks. Algorithms, 2(2):790–
807.
Christandl, M., K
¨
onig, R., and Renner, R. (2009). Posts-
election technique for quantum channels with appli-
cations to quantum cryptography. Phys. Rev. Lett.,
102:020504.
Mayers, D. (2001). Unconditional security in quantum
cryptography. J. ACM, 48(3):351–406.
Nielsen, M. A. and Chuang, I. L. (2010). Quantum compu-
tation and quantum information. Cambridge univer-
sity press.
Renner, R. (2008). Security of quantum key distribution.
Int. J. Quantum Inf., 6(01):1–127.
Renner, R., Gisin, N., and Kraus, B. (2005). Information-
theoretic security proof for quantum-key-distribution
protocols. Phys. Rev. A, 72:012332.
Shor, P. W. and Preskill, J. (2000). Simple proof of security
of the bb84 quantum key distribution protocol. Phys.
Rev. Lett., 85:441–444.
Security Against Collective Attacks of a Modified BB84 QKD Protocol with Information only in One Basis
29