Playground
暗号 BB84 Protocol
Quantum key distribution - provably secure communication
How BB84 Works
The Protocol
- Alice sends qubits in random bases (⊕ or ⊗)
- Bob measures in random bases
- They publicly compare bases (not values)
- Keep only matching-basis measurements
- Check error rate to detect eavesdroppers
Why It's Secure
- • No-cloning theorem prevents copying qubits
- • Measurement disturbs quantum states
- • Eavesdropping introduces detectable errors
- • Error rate >11% indicates interception