Key-leakage evaluation of authentication in quantum key distribution with finite resources

被引:0
|
作者
Chun Zhou
Wan-Su Bao
Hong-Wei Li
Yang Wang
Xiang-Qun Fu
机构
[1] Zhengzhou Information Science and Technology Institute,
来源
关键词
Quantum key distribution; Authentication key; Finite-length key; Composable security; Information leakages; Key lifetime;
D O I
暂无
中图分类号
学科分类号
摘要
Partial information leakages of generation key undoubtedly influence the security of practical Quantum Key Distribution (QKD) system. In this paper, based on finite-key analysis and deep investigation on privacy amplification, we present a method for characterizing information leakages gained by adversary in each authentication round and therefore take the theory derived by Cederlöf and Larsson (IEEE Trans Inf Theory 54:1735–1741, 2008) into practical case. As the authentication key is fed from one round of generation keys to the next except the first round, by considering its security weakness due to information leakages and finite size effect, we further propose a universal formula for calculating the lifetime of initial authentication key used in QKD with finite resources. Numerical simulations indicate that our bound for estimating information leakages strictly characterizes the stability of practical QKD against information-leakage-based attacks, and our calculation formula in terms of lifetime can precisely evaluate the usage time of initial authentication key. Our work provides a practical solution for evaluating authentication security of QKD.
引用
收藏
页码:935 / 955
页数:20
相关论文
共 50 条
  • [21] Quantum key distribution and quantum authentication based on entangled state
    Shi, BS
    Li, J
    Liu, JM
    Fan, XF
    Guo, GC
    PHYSICS LETTERS A, 2001, 281 (2-3) : 83 - 87
  • [22] Robust message authentication in the context of quantum key distribution
    Shanmugam, Dillibabu
    Rangasamy, Jothi
    INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2022, 18 (3-4) : 365 - 382
  • [23] Quantum key distribution with two-way authentication
    Xiaobo Zheng
    Zhiwen Zhao
    Optical and Quantum Electronics, 2021, 53
  • [24] Authentication of variable length messages in quantum key distribution
    Khodakhast Bibak
    Bruce M. Kapron
    Venkatesh Srinivasan
    EPJ Quantum Technology, 2022, 9
  • [25] An enhanced quantum key distribution protocol for security authentication
    Kumar, Ankit
    Dadheech, Pankaj
    Singh, Vijander
    Raja, Linesh
    Poonia, Ramesh C.
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2019, 22 (04): : 499 - 507
  • [26] Quantum key distribution with two-way authentication
    Zheng, Xiaobo
    Zhao, Zhiwen
    OPTICAL AND QUANTUM ELECTRONICS, 2021, 53 (06)
  • [27] Authentication of variable length messages in quantum key distribution
    Bibak, Khodakhast
    Kapron, Bruce M.
    Srinivasan, Venkatesh
    EPJ QUANTUM TECHNOLOGY, 2022, 9 (01)
  • [28] Analysis on Key-leakage Hardware Trojan of SM4 Algorithm
    Chen, Yue
    Zhang, Zhenhui
    Wu, Liji
    Zhang, Xiangmin
    Yang, Yijun
    PROCEEDINGS OF 2018 12TH IEEE INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION (ASID), 2018, : 164 - 168
  • [29] Finite-key analysis for practical implementations of quantum key distribution
    Cai, Raymond Y. Q.
    Scarani, Valerio
    NEW JOURNAL OF PHYSICS, 2009, 11
  • [30] FINITE-KEY ANALYSIS FOR QUANTUM KEY DISTRIBUTION WITH DECOY STATES
    Song, Ting-Ting
    Zhang, Jie
    Qin, Su-Juan
    Gao, Fei
    Wen, Qiao-Yan
    QUANTUM INFORMATION & COMPUTATION, 2011, 11 (5-6) : 374 - 389