Key-leakage evaluation of authentication in quantum key distribution with finite resources

被引:0
|
作者
Chun Zhou
Wan-Su Bao
Hong-Wei Li
Yang Wang
Xiang-Qun Fu
机构
[1] Zhengzhou Information Science and Technology Institute,
来源
关键词
Quantum key distribution; Authentication key; Finite-length key; Composable security; Information leakages; Key lifetime;
D O I
暂无
中图分类号
学科分类号
摘要
Partial information leakages of generation key undoubtedly influence the security of practical Quantum Key Distribution (QKD) system. In this paper, based on finite-key analysis and deep investigation on privacy amplification, we present a method for characterizing information leakages gained by adversary in each authentication round and therefore take the theory derived by Cederlöf and Larsson (IEEE Trans Inf Theory 54:1735–1741, 2008) into practical case. As the authentication key is fed from one round of generation keys to the next except the first round, by considering its security weakness due to information leakages and finite size effect, we further propose a universal formula for calculating the lifetime of initial authentication key used in QKD with finite resources. Numerical simulations indicate that our bound for estimating information leakages strictly characterizes the stability of practical QKD against information-leakage-based attacks, and our calculation formula in terms of lifetime can precisely evaluate the usage time of initial authentication key. Our work provides a practical solution for evaluating authentication security of QKD.
引用
收藏
页码:935 / 955
页数:20
相关论文
共 50 条
  • [31] Finite-key security analysis for multilevel quantum key distribution
    Bradler, Kamil
    Mirhosseini, Mohammad
    Fickler, Robert
    Broadbent, Anne
    Boyd, Robert
    NEW JOURNAL OF PHYSICS, 2016, 18
  • [32] Fundamental Finite Key Limits for Information Reconciliation in Quantum Key Distribution
    Tomamichel, Marco
    Martinez-Mateo, Jesus
    Pacher, Christoph
    Elkouss, David
    2014 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2014, : 1469 - 1473
  • [33] Finite-key effects in multipartite quantum key distribution protocols
    Grasselli, Federico
    Kampermann, Hermann
    Bruss, Dagmar
    NEW JOURNAL OF PHYSICS, 2018, 20
  • [34] Public key encryption secure against related-key attacks and key-leakage attacks from extractable hash proofs
    Hu, Chengyu
    Liu, Pengtao
    Guo, Shanqing
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2016, 7 (05) : 681 - 692
  • [35] Public key encryption secure against related-key attacks and key-leakage attacks from extractable hash proofs
    Chengyu Hu
    Pengtao Liu
    Shanqing Guo
    Journal of Ambient Intelligence and Humanized Computing, 2016, 7 : 681 - 692
  • [36] Security of the Decoy State Two-Way Quantum Key Distribution with Finite Resources
    Gu, Ya-Bin
    Bao, Wan-Su
    Wang, Yang
    Zhou, Chun
    CHINESE PHYSICS LETTERS, 2016, 33 (04)
  • [37] Security of the Decoy State Two-Way Quantum Key Distribution with Finite Resources
    古亚彬
    鲍皖苏
    汪洋
    周淳
    Chinese Physics Letters, 2016, (04) : 5 - 9
  • [38] Security of the Decoy State Two-Way Quantum Key Distribution with Finite Resources
    古亚彬
    鲍皖苏
    汪洋
    周淳
    Chinese Physics Letters, 2016, 33 (04) : 5 - 9
  • [39] Quantum Authentication Evolution: Novel Approaches for Securing Quantum Key Distribution
    Termos, Hassan
    ENTROPY, 2024, 26 (06)
  • [40] Comment on “Quantum Key Distribution and Quantum Authentication Based on Entangled State”
    Toung-Shang Wei
    Chia-Wei Tsai
    Tzonelih Hwang
    International Journal of Theoretical Physics, 2011, 50 : 2703 - 2707