Filters








18,985 Hits in 5.2 sec

A Proof of the Security of Quantum Key Distribution

Eli Biham, Michel Boyer, P. Oscar Boykin, Tal Mor, Vwani Roychowdhury
2006 Journal of Cryptology  
We prove the security of quantum key distribution against the most general attacks which can be performed on the channel, by an eavesdropper who has unlimited computation abilities, and the full power  ...  The proof of the original BB84 protocol follows immediately, due to a simple reduction, as we show in Appendix B.  ...  Summary We proved the security of the Bennett-Brassard (BB84) protocol for quantum key distribution.  ... 
doi:10.1007/s00145-005-0011-3 fatcat:yliqwtmtwzgzpohscxmrdp2swy

A Proof of the Security of Quantum Key Distribution [article]

Eli Biham, Michel Boyer, P. Oscar Boykin, Tal Mor, Vwani Roychowdhury
1999 arXiv   pre-print
We prove the security of quantum key distribution against the most general attacks which can be performed on the channel, by an eavesdropper who has unlimited computation abilities, and the full power  ...  A key created that way can then be used to transmit secure messages in a way that their security is also unaffected in the future.  ...  Introduction Quantum key distribution [1] uses the power of quantum mechanics to suggest the distribution of a key that is secure against an adversary with unlimited computation power.  ... 
arXiv:quant-ph/9912053v1 fatcat:fobchpylfjgwfeviunn4r42b5a

A Proof of the Security of Quantum Key Distribution [article]

Eli Biham, Michel Boyer, P. Oscar Boykin, Tal Mor, Vwani Roychowdhury
2005 arXiv   pre-print
We prove the security of theoretical quantum key distribution against the most general attacks which can be performed on the channel, by an eavesdropper who has unlimited computation abilities, and the  ...  A key created that way can then be used to transmit secure messages such that their security is also unaffected in the future.  ...  Introduction Quantum key distribution [3, 2] uses the power of quantum mechanics to suggest the distribution of a key that is secure against an adversary with unlimited computation power.  ... 
arXiv:quant-ph/0511175v1 fatcat:qtanoprurfagvmktti3hpnmphe

A simple proof of the unconditional security of quantum key distribution

Hoi-Kwong Lo
2001 Journal of Physics A: Mathematical and General  
Here, a conceptually simpler proof of security of quantum key distribution is presented.  ...  Quantum key distribution is the most well-known application of quantum cryptography. Previous proposed proofs of security of quantum key distribution contain various technical subtleties.  ...  Quantum key distribution (QKD) [1, 11] has been proposed as a new solution to the key distribution problem.  ... 
doi:10.1088/0305-4470/34/35/321 fatcat:aqlf2s223fge3ipe32byncushq

Shor-Preskill-type security proof for quantum key distribution without public announcement of bases

Won-Young Hwang, Xiang-Bin Wang, Keiji Matsumoto, Jaewan Kim, Hai-Woong Lee
2003 Physical Review A. Atomic, Molecular, and Optical Physics  
We give a Shor-Preskill type security-proof to the quantum key distribution without public announcement of bases [W.Y. Hwang et al., Phys. Lett. A 244, 489 (1998)].  ...  First, we modify the Lo-Chau protocol once more so that it finally reduces to the quantum key distribution without public announcement of bases.  ...  We give a Shor-Preskill type security-proof to the quantum key distribution without public announcement of bases [W.Y. Hwang et al., Phys. Lett. A 244, 489 (1998) ].  ... 
doi:10.1103/physreva.67.012302 fatcat:l6uoqbljubg3lbyapi43ymiee4

Security proof of differential phase shift quantum key distribution in the noiseless case

Yi-Bo Zhao, Chi-Hang Fred Fung, Zheng-Fu Han, Guang-Can Guo
2008 Physical Review A. Atomic, Molecular, and Optical Physics  
Differential phase shift quantum key distribution systems have a high potential for achieving high speed key generation.  ...  We compute the lower bound of the secret key generation rate using the information-theoretical security proof method.  ...  INTRODUCTION Quantum key distribution ͑QKD͒ allows two distant parties to share secret keys that are unconditionally secure. Until now, there have been several kinds of QKD protocols.  ... 
doi:10.1103/physreva.78.042330 fatcat:qengoxh65vf5xfjwyjlajeiluu

Quantum circuit for the proof of the security of quantum key distribution without encryption of error syndrome and noisy processing

Kiyoshi Tamaki, Go Kato
2010 Physical Review A. Atomic, Molecular, and Optical Physics  
One of the simplest security proofs of quantum key distribution is based on the so-called complementarity scenario, which involves the complementarity control of an actual protocol and a virtual protocol  ...  Moreover, our circuit with a shield system gives an intuitive proof of why adding noise to the sifted key increases the bit error rate threshold in the general case in which one of the parties does not  ...  INTRODUCTION Quantum key distribution (QKD) is one of the most attractive research areas in quantum information theory, which has practical applications, and it has been intensively investigated both experimentally  ... 
doi:10.1103/physreva.81.022316 fatcat:qfbmhcx3jvgfpb4zjsi5i35ikm

A security proof of the round-robin differential phase shift quantum key distribution protocol based on the signal disturbance

Toshihiko Sasaki, Masato Koashi
2017 Quantum Science and Technology  
The round-robin differential phase shift (RRDPS) quantum key distribution (QKD) protocol is a unique quantum key distribution protocol whose security has not been understood through an information-disturbance  ...  When the length of a block of pulses used for encoding and the signal disturbance are both small, it provides a significantly better key rate than that from the original security proof.  ...  This work was funded in part by ImPACT Program of Council for Science, Technology and Innovation (Cabinet Office, Government of Japan), Photon Frontier Network Program (Ministry of Education, Culture,  ... 
doi:10.1088/2058-9565/aa6ef9 fatcat:bijn2cywr5fzvoomw76spas6oa

Quantum key distribution with delayed privacy amplification and its application to the security proof of a two-way deterministic protocol

Chi-Hang Fred Fung, Xiongfeng Ma, H. F. Chau, Qing-yu Cai
2012 Physical Review A. Atomic, Molecular, and Optical Physics  
Delaying PA has two applications: it serves as a tool for significantly simplifying the security proof of QKD with a two-way quantum channel, and also it is useful in QKD networks with trusted relays.  ...  Privacy amplification (PA) is an essential post-processing step in quantum key distribution (QKD) for removing any information an eavesdropper may have on the final secret key.  ...  First, we decompose | A Ā = i=0,1 λ i |i z A |e i Ā, where |i z A are the normalized eigenstates of basis z and |e i Ā are normalized but not necessarily  ... 
doi:10.1103/physreva.85.032308 fatcat:dqgfgatjqbhglhags6blh5ijdm

Refined security proof of the round-robin differential-phase-shift quantum key distribution and its improved performance in the finite-sized case

Takaya Matsuura, Toshihiko Sasaki, Masato Koashi
2019 Physical Review A  
To expedite implementation of the protocol, however, the number of pulses forming a single block should be kept small, which significantly decreases the key rates in the original security proof.  ...  Among many quantum key distribution (QKD) protocols, the round-robin differential phase shift (RRDPS) protocol is unique in that it can upper-bound the amount of the information leakage without monitoring  ...  Acknowledgments This work was funded in part by ImPACT Program of Council for Science, Technology and Innovation (Cabinet Office, Government of Japan), Photon Frontier Network Program (Ministry of Education  ... 
doi:10.1103/physreva.99.042303 fatcat:zygtywr6anckrpc4tsizn4wxvy

A Simple Security Proof for Entanglement-Based Quantum Key Distribution

Mhlambululi Mafu
2016 Journal of Quantum Information Science  
Quantum cryptography exploits the quantum mechanical properties of communication lines to enhance the security of the so-called key distribution.  ...  More importantly, we show by a simple security proof that for any state sent by the sender, the eavesdropper can only guess the output state with a probability that will allow her not to learn more than  ...  Acknowledgements This work is based on research supported by the Research Initiation Grant of the Botswana International University of Science and Technology.  ... 
doi:10.4236/jqis.2016.64018 fatcat:yekzrcuvsfamlndyumiyo3xlzm

Security of Quantum Key Distribution Protocols [chapter]

Mhlambululi Mafu, Makhamisa Senekane
2018 Advanced Technologies of Quantum Key Distribution  
Quantum key distribution (QKD), another name for quantum cryptography, is the most advanced subfield of quantum information and communication technology (QICT).  ...  This phenomenon is beyond the ability of classical information processing. We then study some tools that are used in the derivation of security proofs for the infinite-and finite-length key limits.  ...  realised that if the legitimate parties possess a reliable quantum computer, they can implement an entanglement distillation (ED) protocol to obtain a secure version of an EB key distribution [7] .  ... 
doi:10.5772/intechopen.74234 fatcat:7lsbxngxwfarjnlnnqshr7pmua

Quantum cloning bound and application to quantum key distribution

Erik Woodhead
2013 Physical Review A. Atomic, Molecular, and Optical Physics  
We introduce a quantum cloning bound which we apply to a straightforward and relatively direct security proof of the prepare-and-measure Bennett-Brassard 1984 (BB84) quantum key distribution (QKD) protocol  ...  The approach we propose is able to handle the practical problem of source and detector alignment imprecisions in a simple way.  ...  August 2013 Quantum key distribution (QKD) was proposed nearly 30 years ago by Bennett and Brassard [1] as a way to generate and distribute cryptographic keys whose security is guaranteed by the laws  ... 
doi:10.1103/physreva.88.012331 fatcat:teosesckubbfblwebr3y4hgxne

On the security of two-way quantum key distribution [article]

Jesni Shamsul Shaari, Stefano Mancini, Stefano Pirandola, Marco Lucamarini
2019 arXiv   pre-print
An author (arXiv:1709.09262 [quant-ph] (2017), Nanoscale Research Letters (2017) 12:552) has recently questioned the security of two-way quantum key distribution schemes by referring to attack strategies  ...  We argue that the article is based on a flawed understanding of the actual workings of a two-way protocol, thus the erroneous conclusions drawn thereof.  ...  [1] , protocols for two-way Quantum Key Distribution (QKD) [2, 3] , in particular the Ping-Pong protocol [4] and the LM05 protocol [5] , were criticized under a specific well-known attack called "Quantum-Man-in-the-Middle  ... 
arXiv:1805.01651v5 fatcat:be3yngy2sve5fb57ldhqvgdrgu

A Quantum-Classical Scheme towards Quantum Functional Encryption [article]

Aditya Ahuja
2017 arXiv   pre-print
In this paper, we give a novel one-bit secret-key quantum encryption scheme, a classical extension of which allows different key holders to learn different length subsequences of the plaintext from the  ...  We prove our quantum-classical scheme secure under the notions of quantum semantic security, quantum entropic indistinguishability, and recent security definitions from the field of functional encryption  ...  We have proved this scheme to have quantum semantic security, and quantum entropic indistinguishability as a function of the min-entropy of the message distribution.  ... 
arXiv:1703.00207v1 fatcat:jsjcctvsgfahxf5gutguuo7pdu
« Previous Showing results 1 — 15 out of 18,985 results