Information-theoretic security proof for quantum-key-distribution protocols

被引:377
作者
Renner, R [1 ]
Gisin, N
Kraus, B
机构
[1] ETH, Dept Comp Sci, CH-8092 Zurich, Switzerland
[2] Univ Geneva, Appl Phys Grp, CH-1211 Geneva, Switzerland
关键词
D O I
10.1103/PhysRevA.72.012332
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
We present a technique for proving the security of quantum-key-distribution (QKD) protocols. It is based on direct information-theoretic arguments and thus also applies if no equivalent entanglement purification scheme can be found. Using this technique, we investigate a general class of QKD protocols with one-way classical post-processing. We show that, in order to analyze the full security of these protocols, it suffices to consider collective attacks. Indeed, we give new lower and upper bounds on the secret-key rate which only involve entropies of two-qubit density operators and which are thus easy to compute. As an illustration of our results, we analyze the Bennett-Brassard 1984, the six-state, and the Bennett 1992 protocols with one-way error correction and privacy amplification. Surprisingly, the performance of these protocols is increased if one of the parties adds noise to the measurement data before the error correction. In particular, this additional noise makes the protocols more robust against noise in the quantum channel.
引用
收藏
页数:17
相关论文
共 32 条
[1]  
[Anonymous], 1985, IBM Technical Disclosure Bulletin, V28, P3153
[2]   Incoherent and coherent eavesdropping in the six-state protocol of quantum cryptography [J].
Bechmann-Pasquinucci, H ;
Gisin, N .
PHYSICAL REVIEW A, 1999, 59 (06) :4238-4248
[3]   Non-linear quantum state transformation of spin-1/2 [J].
Bechmann-Pasquinucci, H ;
Huttner, B ;
Gisin, N .
PHYSICS LETTERS A, 1998, 242 (4-5) :198-204
[4]  
Bennett C.H., 1984, P IEEE INT C COMP SY, P175, DOI DOI 10.1016/J.TCS.2014.05.025
[5]   QUANTUM CRYPTOGRAPHY USING ANY 2 NONORTHOGONAL STATES [J].
BENNETT, CH .
PHYSICAL REVIEW LETTERS, 1992, 68 (21) :3121-3124
[6]   Purification of noisy entanglement and faithful teleportation via noisy channels [J].
Bennett, CH ;
Brassard, G ;
Popescu, S ;
Schumacher, B ;
Smolin, JA ;
Wootters, WK .
PHYSICAL REVIEW LETTERS, 1996, 76 (05) :722-725
[7]  
BENOR M, UNPUB
[8]   Bounds on information and the security of quantum cryptography [J].
Biham, E ;
Mor, T .
PHYSICAL REVIEW LETTERS, 1997, 79 (20) :4034-4037
[9]  
Biham E., 2000, Proceedings of the Thirty Second Annual ACM Symposium on Theory of Computing, P715, DOI 10.1145/335305.335406
[10]   Security of quantum key distribution against all collective attacks [J].
Biham, E ;
Boyer, M ;
Brassard, G ;
van de Graaf, J ;
Mor, T .
ALGORITHMICA, 2002, 34 (04) :372-388