A largely self-contained and complete security proof for quantum key distribution

被引:87
作者
Tomamichel, Marco [1 ]
Leverrier, Anthony [2 ]
机构
[1] Univ Technol Sydney, Ctr Quantum Software & Informat, Sydney, NSW, Australia
[2] Inria Paris, Paris, France
关键词
UNCONDITIONAL SECURITY; CRYPTOGRAPHY; ENTANGLEMENT; SYSTEMS;
D O I
10.22331/q-2017-07-14-14
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
In this work we present a security analysis for quantum key distribution, establishing a rigorous tradeoff between various protocol and security parameters for a class of entanglement-based and prepare-and-measure protocols. The goal of this paper is twofold: 1) to review and clarify the state-of-the-art security analysis based on entropic uncertainty relations, and 2) to provide an accessible resource for researchers interested in a security analysis of quantum cryptographic protocols that takes into account finite resource effects. For this purpose we collect and clarify several arguments spread in the literature on the subject with the goal of making this treatment largely self-contained. More precisely, we focus on a class of prepare-and-measure protocols based on the Bennett Brassard (BB81) protocol as well as a class of entanglement-based protocols similar to the Bennett-Brassard-Mermin (BBM92) protocol. We carefully formalize the different steps in these protocols, including randomization, measurement, parameter estimation, error correction and privacy amplification, allowing us to be mathematically precise throughout the security analysis. We start from an operational definition of what it means fora quantum key distribution protocol to be secure and derive simple conditions that serve as sufficient condition for secrecy and correctness. We then derive and eventually discuss tradeoff relations between the block length of the classical computation, the noise tolerance, the secret key length and the security parameters for our protocols. Our results significantly improve upon previously reported tradeoffs.
引用
收藏
页数:38
相关论文
共 47 条
[1]  
[Anonymous], 2012, ARXIV PREPRINT ARXIV
[2]  
[Anonymous], 1984, P IEEE INT C COMP, DOI DOI 10.1016/J.TCS.2014.05.025
[3]  
Arnon-Friedman R., 2016, SIMPLE TIGHT DEVICE
[4]   QUANTUM CRYPTOGRAPHY WITHOUT BELL THEOREM [J].
BENNETT, CH ;
BRASSARD, G ;
MERMIN, ND .
PHYSICAL REVIEW LETTERS, 1992, 68 (05) :557-559
[5]  
Bhatia R., 1997, Matrix Analysis
[6]   Optimal eavesdropping in quantum cryptography with six states [J].
Bruss, D .
PHYSICAL REVIEW LETTERS, 1998, 81 (14) :3018-3021
[7]  
CARTER JL, 1979, J COMPUT SYST SCI, V18, P143, DOI 10.1016/0022-0000(79)90044-8
[8]   Postselection Technique for Quantum Channels with Applications to Quantum Cryptography [J].
Christandl, Matthias ;
Koenig, Robert ;
Renner, Renato .
PHYSICAL REVIEW LETTERS, 2009, 102 (02)
[9]  
Comandar LC, 2016, NAT PHOTONICS, V10, P312, DOI [10.1038/NPHOTON.2016.50, 10.1038/nphoton.2016.50]
[10]   Distillation of secret key and entanglement from quantum states [J].
Devetak, I ;
Winter, A .
PROCEEDINGS OF THE ROYAL SOCIETY A-MATHEMATICAL PHYSICAL AND ENGINEERING SCIENCES, 2005, 461 (2053) :207-235