Optimal attacks on qubit-based Quantum Key Recycling

被引:0
|
作者
Daan Leermakers
Boris Škorić
机构
[1] Eindhoven University of Technology (TU/e),
来源
关键词
Quantum cryptography; Quantum Key Recycling; Quantum information;
D O I
暂无
中图分类号
学科分类号
摘要
Quantum Key Recycling (QKR) is a quantum cryptographic primitive that allows one to reuse keys in an unconditionally secure way. By removing the need to repeatedly generate new keys, it improves communication efficiency. Škorić and de Vries recently proposed a QKR scheme based on 8-state encoding (four bases). It does not require quantum computers for encryption/decryption but only single-qubit operations. We provide a missing ingredient in the security analysis of this scheme in the case of noisy channels: accurate upper bounds on the required amount of privacy amplification. We determine optimal attacks against the message and against the key, for 8-state encoding as well as 4-state and 6-state conjugate coding. We provide results in terms of min-entropy loss as well as accessible (Shannon) information. We show that the Shannon entropy analysis for 8-state encoding reduces to the analysis of quantum key distribution, whereas 4-state and 6-state suffer from additional leaks that make them less effective. From the optimal attacks we compute the required amount of privacy amplification and hence the achievable communication rate (useful information per qubit) of qubit-based QKR. Overall, 8-state encoding yields the highest communication rates.
引用
收藏
相关论文
共 50 条
  • [21] Quantum Switches for Gottesman-Kitaev-Preskill Qubit-Based All-Photonic Quantum Networks
    Azari, Mohadeseh
    Polakos, Paul
    Seshadreesan, Kaushik P.
    IEEE TRANSACTIONS ON QUANTUM ENGINEERING, 2024, 5
  • [22] Recycling of a quantum field and optimal states for single-qubit rotations
    Vuglar, Shanon
    Gea-Banacloche, Julio
    PHYSICAL REVIEW A, 2024, 109 (02)
  • [23] A quantum cipher with near optimal key-recycling
    Damgård, I
    Pedersen, TB
    Salvail, L
    ADVANCES IN CRYPTOLOGY - CRYPTO 2005, PROCEEDINGS, 2005, 3621 : 494 - 510
  • [24] Symmetries in quantum key distribution and the connection between optimal attacks and optimal cloning
    Ferenczi, Agnes
    Luetkenhaus, Norbert
    PHYSICAL REVIEW A, 2012, 85 (05):
  • [25] Qubit-Based Clock Synchronization for QKD Systems Using a Bayesian Approach
    Cochran, Roderick D.
    Gauthier, Daniel J.
    ENTROPY, 2021, 23 (08)
  • [26] Optimal realistic attacks in continuous-variable quantum key distribution
    Hosseinidehaj, Nedasadat
    Walk, Nathan
    Ralph, Timothy C.
    PHYSICAL REVIEW A, 2019, 99 (05)
  • [27] An RF SQUID readout for a flux qubit-based microwave single photon counter
    Shnyrkov, V., I
    Shapovalov, A. P.
    Lyakhno, V. Yu
    Dumik, A. O.
    Kalenyuk, A. A.
    Febvre, P.
    SUPERCONDUCTOR SCIENCE & TECHNOLOGY, 2023, 36 (03):
  • [28] Quantum Authentication with Key Recycling
    Portmann, Christopher
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2017, PT III, 2017, 10212 : 339 - 368
  • [29] Qubit and bit-based quantum hybrid secret key generation
    Shyam R. Sihare
    The European Physical Journal D, 2022, 76
  • [30] Ternary quantum public-key cryptography based on qubit rotation
    Yuqi Wang
    Geng Chen
    Liya Jian
    Yi Zhou
    Shiming Liu
    Quantum Information Processing, 21