A largely self-contained and complete security proof for quantum key distribution

被引:69
|
作者
Tomamichel, Marco [1 ]
Leverrier, Anthony [2 ]
机构
[1] Univ Technol Sydney, Ctr Quantum Software & Informat, Sydney, NSW, Australia
[2] Inria Paris, Paris, France
来源
QUANTUM | 2017年 / 1卷
关键词
UNCONDITIONAL SECURITY; CRYPTOGRAPHY; ENTANGLEMENT; SYSTEMS;
D O I
10.22331/q-2017-07-14-14
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
In this work we present a security analysis for quantum key distribution, establishing a rigorous tradeoff between various protocol and security parameters for a class of entanglement-based and prepare-and-measure protocols. The goal of this paper is twofold: 1) to review and clarify the state-of-the-art security analysis based on entropic uncertainty relations, and 2) to provide an accessible resource for researchers interested in a security analysis of quantum cryptographic protocols that takes into account finite resource effects. For this purpose we collect and clarify several arguments spread in the literature on the subject with the goal of making this treatment largely self-contained. More precisely, we focus on a class of prepare-and-measure protocols based on the Bennett Brassard (BB81) protocol as well as a class of entanglement-based protocols similar to the Bennett-Brassard-Mermin (BBM92) protocol. We carefully formalize the different steps in these protocols, including randomization, measurement, parameter estimation, error correction and privacy amplification, allowing us to be mathematically precise throughout the security analysis. We start from an operational definition of what it means fora quantum key distribution protocol to be secure and derive simple conditions that serve as sufficient condition for secrecy and correctness. We then derive and eventually discuss tradeoff relations between the block length of the classical computation, the noise tolerance, the secret key length and the security parameters for our protocols. Our results significantly improve upon previously reported tradeoffs.
引用
收藏
页数:38
相关论文
共 50 条
  • [21] Vector Addition System Reachability Problem A Short Self-Contained Proof
    Leroux, Jerome
    ACM SIGPLAN NOTICES, 2011, 46 (01) : 307 - 316
  • [22] A new and self-contained proof of Borwein's norm duality theorem
    Aragon Artacho, Francisco J.
    SET-VALUED ANALYSIS, 2007, 15 (03): : 307 - 315
  • [23] A SIMPLER SECURITY PROOF FOR 6-STATE QUANTUM KEY DISTRIBUTION
    Akyuz, Kaan
    Skoric, Boris
    QUANTUM INFORMATION & COMPUTATION, 2023, 23 (11-12) : 949 - 960
  • [24] A SIMPLER SECURITY PROOF FOR 6-STATE QUANTUM KEY DISTRIBUTION
    Akyuz K.
    Škorić B.
    Quantum Information and Computation, 2023, 23 (11-12): : 949 - 960
  • [25] Efficient Quantum Key Distribution Scheme and a Proof of Its Unconditional Security
    Hoi-Kwong Lo
    H.F. Chau
    M. Ardehali
    Journal of Cryptology, 2005, 18 : 133 - 165
  • [26] Efficient quantum key distribution scheme and a proof of its unconditional security
    Lo, HK
    Chau, HF
    Ardehali, M
    JOURNAL OF CRYPTOLOGY, 2005, 18 (02) : 133 - 165
  • [27] Security proof for quantum-key-distribution systems with threshold detectors
    Tsurumaru, Toyohiro
    Tamaki, Kiyoshi
    PHYSICAL REVIEW A, 2008, 78 (03):
  • [28] SELF-CONTAINED INSTRUMENT FOR LOGARITHMIC RECORDING OF SUBMARINE QUANTUM IRRADIANCE
    CHAPMAN, ARO
    HOYT, B
    PATON, BE
    MARINE BIOLOGY, 1976, 38 (01) : 91 - 94
  • [29] CORRECTION OF COMPLETE HEART BLOCK BY A TRANSISTORIZED, SELF-CONTAINED, AND IMPLANTABLE PACEMAKER
    CHARDACK, WM
    GAGE, AA
    GREATBATCH, W
    CIRCULATION, 1960, 22 (04) : 732 - 732
  • [30] Fully self-contained turn-key soliton microcomb source
    Pavlov, Nikolay G.
    Riemensberger, Johann
    Liu, Junqiu
    He, Jijun
    Wang, Rui N.
    Raja, Arslan S.
    Likhachev, Grigorii
    Kippenberg, Tobias J.
    Jost, John D.
    2021 ANNUAL CONFERENCE OF THE IEEE PHOTONICS SOCIETY (IPC), 2021,