Method for decoupling error correction from privacy amplification

被引:26
作者
Lo, HK
机构
[1] Univ Toronto, Dept Elect & Comp Engn, Toronto, ON M5S 3G4, Canada
[2] Univ Toronto, Dept Phys, Toronto, ON M5S 3G4, Canada
关键词
D O I
10.1088/1367-2630/5/1/336
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
In a standard quantum key distribution (QKD) scheme such as BB84, two procedures, error correction and privacy amplification, are applied to extract a final secure key from a raw key generated from quantum transmission. To simplify the study of protocols, it is commonly assumed that the two procedures can be decoupled from each other. While such a decoupling assumption may be valid for individual attacks, it is actually unproven in the context of ultimate or unconditional security, which is the Holy Grail of quantum cryptography. In particular, this means that the application of standard efficient two-way error-correction protocols like Cascade is not proven to be unconditionally secure. Here, I provide the first proof of such a decoupling principle in the context of unconditional security. The method requires Alice and Bob to share some initial secret string and use it to encrypt their communications in the error correction stage using one-time-pad encryption. Consequently, I prove the unconditional security of the interactive Cascade protocol proposed by Brassard and Salvail for error correction and modified by one-time-pad encryption of the error syndrome, followed by the random matrix protocol for privacy amplification. This is an efficient protocol in terms of both computational power and key generation rate. My proof uses the entanglement purification approach to security proofs of QKD. The proof applies to all adaptive symmetric methods for error correction, which cover all existing methods proposed for BB84. In terms of the net key generation rate, the new method is as efficient as the standard Shor-Preskill proof.
引用
收藏
页码:36.1 / 36.24
页数:24
相关论文
共 38 条
[1]  
Bennett C. H., 1992, Journal of Cryptology, V5, P3, DOI 10.1007/BF00191318
[2]  
Bennett C. H., 1984, PROC IEEE INT C COMP, P175, DOI [DOI 10.1016/J.TCS.2014.05.025, 10.1016/j.tcs.2014.05.025]
[3]   Generalized privacy amplification [J].
Bennett, CH ;
Brassard, G ;
Crepeau, C ;
Maurer, UM .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1995, 41 (06) :1915-1923
[4]   Purification of noisy entanglement and faithful teleportation via noisy channels [J].
Bennett, CH ;
Brassard, G ;
Popescu, S ;
Schumacher, B ;
Smolin, JA ;
Wootters, WK .
PHYSICAL REVIEW LETTERS, 1996, 76 (05) :722-725
[5]  
BENOR M, 2002, WORKSH QUANT COMP
[6]  
Biham E., 2000, Proceedings of the Thirty Second Annual ACM Symposium on Theory of Computing, P715, DOI 10.1145/335305.335406
[7]  
Brassard G., 1993, ADV CRYPTOLOGY, P410
[8]   Optimal eavesdropping in quantum cryptography with six states [J].
Bruss, D .
PHYSICAL REVIEW LETTERS, 1998, 81 (14) :3018-3021
[9]   Linking information reconciliation and privacy amplification [J].
Cachin, C ;
Maurer, UM .
JOURNAL OF CRYPTOLOGY, 1997, 10 (02) :97-110
[10]   Good quantum error-correcting codes exist [J].
Calderbank, AR ;
Shor, PW .
PHYSICAL REVIEW A, 1996, 54 (02) :1098-1105