Security Analysis of Biased Basis for Efficient BB84

Hiroki Yamamuro, Shohei Beppu, Kazuhide Fukushima, Shinsaku Kiyomoto

2025

Abstract

Quantum key distribution (QKD) is a secure protocol for exchanging a secret key that is based on the principles of quantum physics and fulfills information-theoretical security requirements. The first QKD protocol, BB84, was proposed in 1984. Bit information is sent via four types of quantum states, combining two types of the bits and bases in BB84. However, half of the bits are discarded after the basis information is exchanged since a sender and receiver select a basis equally likely. Lo et al. (J. Cryptol.’05) proposed Efficient BB84, in which basis selection is biased to improve the efficiency. The biased basis selection increases the probability that the selected bases match, which results in fewer bits being discarded. This letter describes an attack method against Efficient BB84 that exploits the bias in basis selection and analyzes the security of the method. An eavesdropper intercepts the first part of the quantum states, performs measurements in the basis with high selection probability, and obtains bit information without being detected. We then evaluate the extent to which the obtained bit information compromises the security of the secret key.

Download


Paper Citation


in Harvard Style

Yamamuro H., Beppu S., Fukushima K. and Kiyomoto S. (2025). Security Analysis of Biased Basis for Efficient BB84. In Proceedings of the 11th International Conference on Information Systems Security and Privacy - Volume 2: ICISSP; ISBN 978-989-758-735-1, SciTePress, pages 571-574. DOI: 10.5220/0013245800003899


in Bibtex Style

@conference{icissp25,
author={Hiroki Yamamuro and Shohei Beppu and Kazuhide Fukushima and Shinsaku Kiyomoto},
title={Security Analysis of Biased Basis for Efficient BB84},
booktitle={Proceedings of the 11th International Conference on Information Systems Security and Privacy - Volume 2: ICISSP},
year={2025},
pages={571-574},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0013245800003899},
isbn={978-989-758-735-1},
}


in EndNote Style

TY - CONF

JO - Proceedings of the 11th International Conference on Information Systems Security and Privacy - Volume 2: ICISSP
TI - Security Analysis of Biased Basis for Efficient BB84
SN - 978-989-758-735-1
AU - Yamamuro H.
AU - Beppu S.
AU - Fukushima K.
AU - Kiyomoto S.
PY - 2025
SP - 571
EP - 574
DO - 10.5220/0013245800003899
PB - SciTePress