Incompleteness and Limit of Security Theory of Quantum Key Distribution

被引:4
作者
Hirota, Osamu [1 ]
Murakami, Dan [1 ]
Kato, Kentaro [1 ]
Futami, Fumio [1 ]
机构
[1] Tamagawa Univ, Quantum ICT Res Inst, Tokyo, Japan
来源
QUANTUM COMMUNICATIONS AND QUANTUM IMAGING X | 2012年 / 8518卷
关键词
Quantum key distribution; Unconditional security; Trace distance; Key estimation attack;
D O I
10.1117/12.929185
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
It is claimed in the many papers that a trace distance: d guarantees the universal composition security in quantum key distribution (QKD) like BB84 protocol. In this introduction paper, at first, it is explicitly explained what is the main misconception in the claim of the unconditional security for QKD theory. In general terms, the cause of the misunderstanding on the security claim is the Lemma in the paper of Renner. It suggests that the generation of the perfect random key is assured by the probability (1 d), and its failure probability is d. Thus, it concludes that the generated key provides the perfect random key sequence when the protocol is success. So the QKD provides perfect secrecy to the one time pad. This is the reason for the composition claim. However, the quantity of the trace distance (or variational distance) is not the probability for such an event. If d is not small enough, always the generated key sequence is not uniform. Now one needs the reconstruction of the evaluation of the trace distance if one wants to use it. One should first go back to the indistinguishability theory in the computational complexity based, and to clarify the meaning of the value of the variational distance. In addition, the same analysis for the information theoretic case is necessary. The recent serial papers by H.F.Yuen have given the answer on such questions. In this paper, we show more concise description of Yuen's theory, and clarify that the upper bound theories for the trace distance by Tomamichel et al and Hayashi et al are constructed by the wrong reasoning of Renner and it is unsuitable as the security analysis. Finally, we introduce a new macroscopic quantum communication to replace Q-bit QKD.
引用
收藏
页数:11
相关论文
共 16 条
[1]   Finite-key analysis for practical implementations of quantum key distribution [J].
Cai, Raymond Y. Q. ;
Scarani, Valerio .
NEW JOURNAL OF PHYSICS, 2009, 11
[2]  
Hayashi M., 2012, 11070589V2 ARXIVORGQ
[3]  
Helstrom C. W, 1976, Quantum Detection and Estimation Theory
[4]  
Hirota O., 2012, P 29 S CRYPT INF SEC
[5]  
Renner R, 2005, LECT NOTES COMPUT SC, V3378, P407
[6]   The uncertainty principle [J].
Robertson, HP .
PHYSICAL REVIEW, 1929, 34 (01) :163-164
[7]   The security of practical quantum key distribution [J].
Scarani, Valerio ;
Bechmann-Pasquinucci, Helle ;
Cerf, Nicolas J. ;
Dusek, Miloslav ;
Luetkenhaus, Norbert ;
Peev, Momtchil .
REVIEWS OF MODERN PHYSICS, 2009, 81 (03) :1301-1350
[8]   COMMUNICATION THEORY OF SECRECY SYSTEMS [J].
SHANNON, CE .
BELL SYSTEM TECHNICAL JOURNAL, 1949, 28 (04) :656-715
[9]  
Tomamichel M., 2012, NATURE COMMUNICATION, V3, P639
[10]   A SINGLE QUANTUM CANNOT BE CLONED [J].
WOOTTERS, WK ;
ZUREK, WH .
NATURE, 1982, 299 (5886) :802-803