Key-leakage evaluation of authentication in quantum key distribution with finite resources

被引:0
|
作者
Chun Zhou
Wan-Su Bao
Hong-Wei Li
Yang Wang
Xiang-Qun Fu
机构
[1] Zhengzhou Information Science and Technology Institute,
来源
关键词
Quantum key distribution; Authentication key; Finite-length key; Composable security; Information leakages; Key lifetime;
D O I
暂无
中图分类号
学科分类号
摘要
Partial information leakages of generation key undoubtedly influence the security of practical Quantum Key Distribution (QKD) system. In this paper, based on finite-key analysis and deep investigation on privacy amplification, we present a method for characterizing information leakages gained by adversary in each authentication round and therefore take the theory derived by Cederlöf and Larsson (IEEE Trans Inf Theory 54:1735–1741, 2008) into practical case. As the authentication key is fed from one round of generation keys to the next except the first round, by considering its security weakness due to information leakages and finite size effect, we further propose a universal formula for calculating the lifetime of initial authentication key used in QKD with finite resources. Numerical simulations indicate that our bound for estimating information leakages strictly characterizes the stability of practical QKD against information-leakage-based attacks, and our calculation formula in terms of lifetime can precisely evaluate the usage time of initial authentication key. Our work provides a practical solution for evaluating authentication security of QKD.
引用
收藏
页码:935 / 955
页数:20
相关论文
共 50 条
  • [1] Key-leakage evaluation of authentication in quantum key distribution with finite resources
    Zhou, Chun
    Bao, Wan-Su
    Li, Hong-Wei
    Wang, Yang
    Fu, Xiang-Qun
    QUANTUM INFORMATION PROCESSING, 2014, 13 (04) : 935 - 955
  • [2] Eavesdropping on counterfactual quantum key distribution with finite resources
    Liu, Xingtong
    Zhang, Bo
    Wang, Jian
    Tang, Chaojing
    Zhao, Jingjing
    Zhang, Sheng
    PHYSICAL REVIEW A, 2014, 90 (02):
  • [3] Decoy state quantum key distribution with finite resources
    Sun, Shi-Hai
    Liang, Lin-Mei
    Li, Cheng-Zu
    PHYSICS LETTERS A, 2009, 373 (30) : 2533 - 2536
  • [4] Quantum key distribution with finite resources: Taking advantage of quantum noise
    Mertz, Markus
    Kampermann, Hermann
    Shadman, Zahra
    Bruss, Dagmar
    PHYSICAL REVIEW A, 2013, 87 (04):
  • [5] Quantum key distribution with finite resources: Secret key rates via Renyi entropies
    Abruzzo, Silvestre
    Kampermann, Hermann
    Mertz, Markus
    Bruss, Dagmar
    PHYSICAL REVIEW A, 2011, 84 (03):
  • [6] Error Rate Estimation in Quantum Key Distribution with Finite Resources
    Lu, Zhao
    Shi, Jian-Hong
    Li, Feng-Guang
    COMMUNICATIONS IN THEORETICAL PHYSICS, 2017, 67 (04) : 360 - 364
  • [7] Error Rate Estimation in Quantum Key Distribution with Finite Resources
    卢钊
    史建红
    李风光
    CommunicationsinTheoreticalPhysics, 2017, 67 (04) : 360 - 364
  • [8] Lightweight Authentication for Quantum Key Distribution
    Kiktenko, Evgeniy O.
    Malyshev, Aleksei O.
    Gavreev, Maxim A.
    Bozhedarov, Anton A.
    Pozhar, Nikolay O.
    Anufriev, Maxim N.
    Fedorov, Aleksey K.
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2020, 66 (10) : 6354 - 6368
  • [9] Finite key effects in satellite quantum key distribution
    Sidhu, Jasminder S.
    Brougham, Thomas
    McArthur, Duncan
    Pousa, Roberto G.
    Oi, Daniel K. L.
    NPJ QUANTUM INFORMATION, 2022, 8 (01)
  • [10] Finite key effects in satellite quantum key distribution
    Jasminder S. Sidhu
    Thomas Brougham
    Duncan McArthur
    Roberto G. Pousa
    Daniel K. L. Oi
    npj Quantum Information, 8