Security of quantum key distribution from generalised entropy
accumulation
- URL: http://arxiv.org/abs/2203.04993v2
- Date: Sat, 18 Nov 2023 04:35:02 GMT
- Title: Security of quantum key distribution from generalised entropy
accumulation
- Authors: Tony Metger, Renato Renner
- Abstract summary: We provide a formal framework for general quantum key distribution protocols.
We show that security against general attacks reduces to security against collective attacks.
Our proof relies on a recently developed information-theoretic tool called generalised entropy accumulation.
- Score: 2.1030878979833467
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: The goal of quantum key distribution (QKD) is to establish a secure key
between two parties connected by an insecure quantum channel. To use a QKD
protocol in practice, one has to prove that a finite size key is secure against
general attacks: no matter the adversary's attack, they cannot gain useful
information about the key. A much simpler task is to prove security against
collective attacks, where the adversary is assumed to behave identically and
independently in each round. In this work, we provide a formal framework for
general QKD protocols and show that for any protocol that can be expressed in
this framework, security against general attacks reduces to security against
collective attacks, which in turn reduces to a numerical computation. Our proof
relies on a recently developed information-theoretic tool called generalised
entropy accumulation and can handle generic prepare-and-measure protocols
directly without switching to an entanglement-based version.
Related papers
- Sequential Attack Impairs Security in Device-independent Quantum Key Distribution [1.0140308935829423]
Device-independent quantum key distribution (DI-QKD)
Uses nonlocal correlations to securely establish cryptographic keys between two honest parties.
Bell violations ensure the inherent unpredictability of the observed statistics.
arXiv Detail & Related papers (2024-11-25T17:50:08Z) - Practical hybrid PQC-QKD protocols with enhanced security and performance [44.8840598334124]
We develop hybrid protocols by which QKD and PQC inter-operate within a joint quantum-classical network.
In particular, we consider different hybrid designs that may offer enhanced speed and/or security over the individual performance of either approach.
arXiv Detail & Related papers (2024-11-02T00:02:01Z) - Coding-Based Hybrid Post-Quantum Cryptosystem for Non-Uniform Information [53.85237314348328]
We introduce for non-uniform messages a novel hybrid universal network coding cryptosystem (NU-HUNCC)
We show that NU-HUNCC is information-theoretic individually secured against an eavesdropper with access to any subset of the links.
arXiv Detail & Related papers (2024-02-13T12:12:39Z) - Security of differential phase shift QKD against explicit individual
attacks [1.9849264945671103]
We characterize the security of the 3 and n-pulse Differential Phase Shift Quantum Key Distribution protocols against individual attacks.
We compare the secure key rates thus obtained with the known lower bounds under a general individual attack.
arXiv Detail & Related papers (2023-05-19T16:56:26Z) - Tight finite-key analysis for mode-pairing quantum key distribution [21.81489337632085]
We analyze the finite-key effect for the MP-QKD protocol with rigorous security proof against general attacks.
We propose a six-state MP-QKD protocol and analyze its finite-key effect.
arXiv Detail & Related papers (2023-02-27T02:35:52Z) - Security of differential phase shift QKD from relativistic principles [1.114274092885218]
This work presents the first full security proof of DPS QKD against general attacks.
The proof combines techniques from quantum information theory, quantum optics, and relativity.
Our results shed light on the range of applicability of state-of-the-art security proof techniques.
arXiv Detail & Related papers (2023-01-26T19:00:00Z) - Simple and Rigorous Proof Method for the Security of Practical Quantum
Key Distribution in the Single-Qubit Regime Using Mismatched Basis
Measurements [0.2519906683279153]
Quantum key distribution (QKD) protocols aim at allowing two parties to generate a secret shared key.
While many QKD protocols have been proven unconditionally secure in theory, practical security analyses of experimental QKD implementations typically do not take into account all possible loopholes.
We present a simple method of computing secure key rates for any practical implementation of discrete-variable QKD.
arXiv Detail & Related papers (2022-08-29T17:37:58Z) - Unbalanced-basis-misalignment tolerant measurement-device-independent
quantum key distribution [22.419105320267523]
Measurement-device-independent quantum key distribution (MDIQKD) is a revolutionary protocol since it is physically immune to all attacks on the detection side.
Some protocols release part of the assumptions in the encoding system to keep the practical security, but the performance would be dramatically reduced.
We present a MDIQKD protocol that requires less knowledge of encoding system to combat the troublesome modulation errors and fluctuations.
arXiv Detail & Related papers (2021-08-27T02:16:20Z) - Dispelling Myths on Superposition Attacks: Formal Security Model and
Attack Analyses [0.0]
We propose the first computational security model considering superposition attacks for multiparty protocols.
We show that our new security model is satisfiable by proving the security of the well-known One-Time-Pad protocol.
We use this newly imparted knowledge to construct the first concrete protocol for Secure Two-Party Computation that is resistant to superposition attacks.
arXiv Detail & Related papers (2020-07-01T18:00:54Z) - Backflash Light as a Security Vulnerability in Quantum Key Distribution
Systems [77.34726150561087]
We review the security vulnerabilities of quantum key distribution (QKD) systems.
We mainly focus on a particular effect known as backflash light, which can be a source of eavesdropping attacks.
arXiv Detail & Related papers (2020-03-23T18:23:12Z) - Experimental composable security decoy-state quantum key distribution
using time-phase encoding [19.037123608278602]
We provide the rigorous finite-key security bounds for four-intensity decoy-state BB84 QKD against coherent attacks.
We build a time-phase encoding system with 200 MHz clocked to implement this protocol, in which the real-time secret key rate is more than 60 kbps over 50 km single-mode fiber.
arXiv Detail & Related papers (2020-02-25T04:59:43Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.