BB84 Protocol

Table of Contents

  1. Introduction
  2. Historical Context and Significance
  3. Basic Idea Behind BB84
  4. Classical vs Quantum Key Distribution
  5. Qubit Encoding in BB84
  6. Polarization Bases Used
  7. Step-by-Step Procedure
  8. Basis Reconciliation
  9. Sifting Process
  10. Error Rate Estimation
  11. Eavesdropping Detection
  12. Privacy Amplification
  13. Security Proofs
  14. Mathematical Description
  15. Photon Polarization Representations
  16. Real-World Implementations
  17. Device Considerations
  18. Limitations of BB84
  19. Photon Loss and Noise
  20. Countermeasures for Attacks
  21. Side-Channel Attacks
  22. Decoy State Method
  23. Satellite-Based BB84
  24. BB84 vs E91 and Other Protocols
  25. Conclusion

1. Introduction

The BB84 protocol, introduced by Charles Bennett and Gilles Brassard in 1984, is the first and most famous quantum key distribution (QKD) protocol. It enables two parties (traditionally named Alice and Bob) to generate a shared secret key with security guaranteed by quantum mechanics.


2. Historical Context and Significance

BB84 was the first protocol to demonstrate the practical utility of quantum mechanics in secure communication. It paved the way for quantum cryptography, allowing unconditionally secure key exchange.


3. Basic Idea Behind BB84

The key idea is that measuring a quantum system disturbs it, allowing the detection of eavesdropping attempts. This distinguishes BB84 from classical key exchange methods.


4. Classical vs Quantum Key Distribution

AspectClassical Key ExchangeBB84 Protocol
Security basisComputational hardnessPhysical laws
Eavesdropper detectionNoYes
Vulnerability to quantumYesNo

5. Qubit Encoding in BB84

Information is encoded into qubits using two non-orthogonal bases:

  • Rectilinear (Z-basis): \( |0\rangle, |1\rangle \)
  • Diagonal (X-basis): \( |+\rangle = \frac{1}{\sqrt{2}}(|0\rangle + |1\rangle), |-\rangle = \frac{1}{\sqrt{2}}(|0\rangle – |1\rangle) \)

6. Polarization Bases Used

In practical photonic implementations:

  • Horizontal (\( |0\rangle \)) and Vertical (\( |1\rangle \))
  • +45° (\( |+\rangle \)) and -45° (\( |-\rangle \))

7. Step-by-Step Procedure

  1. Alice randomly chooses a bit (0 or 1) and a basis (Z or X), and sends a polarized photon.
  2. Bob measures each photon in a randomly chosen basis (Z or X).
  3. Alice and Bob publicly announce their bases (not their bits).
  4. They keep only the results where their bases matched — this is the sifted key.

8. Basis Reconciliation

Alice and Bob communicate over a classical public channel to compare which bases they used. Only measurements where the bases match are kept.


9. Sifting Process

About 50% of the bits are discarded during the sifting step because Alice and Bob used different bases.


10. Error Rate Estimation

They compare a small portion of the sifted key to estimate the Quantum Bit Error Rate (QBER). If it’s too high (typically >11%), they abort the protocol.


11. Eavesdropping Detection

Eavesdropping causes detectable disturbances in the qubit state due to the no-cloning theorem and measurement-induced collapse.


12. Privacy Amplification

Even if some information is leaked, Alice and Bob can use privacy amplification techniques (e.g., hashing) to compress the key and remove leaked parts.


13. Security Proofs

Security of BB84 has been rigorously proven under both:

  • Individual attacks
  • Collective and coherent attacks

Using tools like entropic uncertainty relations and composable security frameworks.


14. Mathematical Description

Let Alice send \( |\psi\rangle \) randomly chosen from:

\[
|0\rangle, |1\rangle \text{ (Z-basis)} \
|+\rangle = \frac{1}{\sqrt{2}}(|0\rangle + |1\rangle),\quad |-\rangle = \frac{1}{\sqrt{2}}(|0\rangle – |1\rangle) \text{ (X-basis)}
\]

Bob randomly measures in Z or X. If the basis matches, Bob gets the correct bit with high probability.


15. Photon Polarization Representations

Logical BitBasisPolarization
0ZHorizontal
1ZVertical
0X+45°
1X-45°

16. Real-World Implementations

BB84 has been implemented in:

  • Fiber-optic networks (up to 500 km)
  • Free-space optical links
  • Satellite-based QKD (e.g., Micius satellite)

17. Device Considerations

Key hardware components include:

  • Single-photon sources
  • Beam splitters and polarizers
  • Single-photon detectors
  • Timing synchronization systems

18. Limitations of BB84

  • Photon loss in fibers
  • Detector noise
  • Imperfect devices can leak information (side channels)

19. Photon Loss and Noise

Loss leads to lower key generation rates. Noise increases QBER and limits communication distance.


20. Countermeasures for Attacks

  • Decoy state protocols to prevent photon-number splitting attacks
  • Device-independent QKD to account for hardware imperfections

21. Side-Channel Attacks

Examples include:

  • Time-shift attacks
  • Detector blinding
  • Trojan horse attacks

22. Decoy State Method

Introduces dummy photons to monitor for photon-number splitting attacks. Widely adopted in practical BB84 implementations.


23. Satellite-Based BB84

Implemented by China’s Micius satellite, enabling secure quantum communication between ground stations over 1,000+ km distances.


24. BB84 vs E91 and Other Protocols

FeatureBB84E91
EntanglementNot requiredRequired
ImplementationSimplerMore complex
Security BasisBasis mismatchBell inequality

25. Conclusion

The BB84 protocol remains a cornerstone of quantum cryptography. Its blend of theoretical elegance and practical implementability makes it the de facto standard in QKD. With enhancements like decoy states and satellite delivery, BB84 is poised to secure communications in the emerging quantum age.


.