首页> 外文会议>Quantum information science and technology IV >Bit-Error-Rate Guarantee for Quantum Key Distribution and Its Characteristics compared to Leftover Hash Lemma
【24h】

Bit-Error-Rate Guarantee for Quantum Key Distribution and Its Characteristics compared to Leftover Hash Lemma

机译:与剩余哈希散列相比,量子密钥分配的误码率保证及其特性

获取原文
获取原文并翻译 | 示例

摘要

The trace distance criterion for security of Quantum Key Distribution (QKD) has been widely perceived that its upper-bound is the maximum failure probability in distributing an ideal quantum state that the quantum system shared by legitimate users is decoupled from the quantum system the eavesdropper possesses, therefore the eavesdropper would not obtain any hints on the key shared by the legitimate users no matter how much her measurement is optimal. However, there an arbitrariness in the definition of the trace distance with the decoupled quantum system the eavesdropper possesses as the previous work pointed out, and such an arbitrariness would be confusions in guaranteeing the security of QKD. In this work, from the framework of Bit-Error-Rate (BER) Guarantee discussed also in the previous work, such an arbitrariness is removed from the definition of the trace distance criterion by discussing the similarities and differences between the security of QKD and classical information-theoretic cryptography by Leftover Hash Lemma (LHL). However, in the previous work BER Guarantee was derived under the assumption that the eavesdropper launches the weakest class of attack, so-called "Individual Attacks." Therefore, it is still unknown whether direct upper-bounding of the term would give tighter upper-bound in general, such as "Collective Attacks" or "Coherent Attacks", compared to the upper-bound by LHL, as well as the secure-key generation rate. This study also revisits the security proof of QKD given by P. Shor and J. Preskill in 2000.
机译:量子密钥分配(QKD)的安全性的跟踪距离标准已被广泛认为,它的上限是分配理想用户所拥有的量子系统与窃听者拥有的量子系统解耦的理想量子状态时的最大失败概率,因此无论窃听者的测量值是最佳值如何,窃听者都不会获得有关合法用户共享密钥的任何提示。然而,如前人所指出的那样,窃听者拥有的解耦量子系统在迹线距离的定义上存在任意性,而这种任意性将在保证QKD安全性方面造成混乱。在这项工作中,从先前工作中也讨论过的误码率保证(BER)框架中,通过讨论QKD与经典安全性之间的异同,将这种任意性从跟踪距离标准的定义中删除。 Leftover Hash Lemma(LHL)的信息理论密码学。但是,在先前的工作中,BER保证是在窃听者发起最弱的攻击类别(即“个人攻击”)的假设下得出的。因此,仍不清楚该术语的直接上限是否会更严格通常,与LHL的上限相比,上限为上限,例如\“ Collective Attacks \”或\“ Coherent Attacks \”以及安全密钥生成率。这项研究还回顾了P.Shor和J.Preskill在2000年给出的QKD安全证明。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号