Skip to main content

Table 1 Comparing BB84-AES, BB84 with biased bases, SARG04 and BB84 with decoy states. It is possible to combine biased basis and decoy state BB84, with sifting efficiency \({\lim_{N\rightarrow\infty}\zeta= \operatorname{Prob} (\operatorname{Signal} )}\)

From: A quantum key distribution protocol for rapid denial of service detection

 

BB84-AES

Biased Basis BB84

SARG04

Decoy State BB84

Mathematical Security with One-Time Pad

PC (short term) IT (long term)†

IT

– (low loss) IT (higher loss)

IT

Mathematical Security with AES-GCM

PC

PC

– (low loss) PC (higher loss)

PC

Endpoint Denial of Service Resistance

Yes

No

No

No

Photon Number Splitting Resistance

Two-photon

No

Two-photon

Yes

Sifting Efficiency (ζ)

100%

\({\lim_{N\rightarrow\infty}\zeta=100\%}\)

25%

\(\frac{1}{2}\times\operatorname{Prob} (\operatorname{Signal} )\)

Requires Hardware Changes

No

Sometimes

No

Yes

  1. † Here, long-term security works under the assumption that the scheme was not broken at the time of key exchange.
  2. Key: IT = Information Theoretic; PC = Practical Computational; – = Unproven.