首页> 外文会议>Conference on quantum information science and technology III >On problems in security of quantum key distribution raised by Yuen
【24h】

On problems in security of quantum key distribution raised by Yuen

机译:论yuen提出的量子密钥分布安全问题

获取原文

摘要

In 2007, it was found that Known-Plaintext-Attack would reveal whole the string of the distributed key by Quantum Key Distribution (QKD) when the part of the plaintext was known to the eavesdropper, Eve, under the mutual information security criterion between Eve and legitimate users, Alice and Bob. To overcome, the trace distance criterion was introduced in the paper that the distance between the distributed quantum state and the ideal quantum state with Eve's quantum system decoupled from the quantum systems shared by Alice and Bob. On the other hand, Shor and Preskill proved in 2000 that entanglement-based QKDs are equivalent to prepare-and-measure QKDs, such as the first QKD, BB84. Their proof employed the mutual information criterion, therefore M. Koashi applied Shor-Preskill approach to the trace distance criterion in 2009. However, H. P. Yuen started criticisms on the security of QKDs from 2009, then completed his criticisms in 2016. He warned the security of QKDs are not sufficient. Furthermore, the trace distance would not provide "universal composability", which is supposed to guarantee Independent and Identically Distributed (IID) keys. He also proposed a new security criterion "Bit-Error-Rate (BER) guarantee," to evaluate the BER in the decoded message by Eve with her key close to the correct key. In this work, the author explains Yuen's criticisms and shows an example of the BER guarantee on BB84. Furthermore, the study revisits whether Shor-Preskill security proof approach really worked.
机译:在2007年,人们发现,已知明文攻击就会发现整个量子密钥分配(QKD)当明文的部分是众所周知的窃听者,夏娃,夏娃之间的互信息安全标准下的分布式密钥字符串与合法用户,Alice和Bob。为了克服,跟踪距离标准的文件被引入该分布式量子态,并用伊芙的量子系统的理想量子态之间的距离由Alice和Bob共享量子系统解耦。在另一方面,肖尔和Preskill于2000年证明了基于缠结-QKDs相当于制备 - 测量QKDs,诸如第一QKD,BB84。他们证明采用互信息标准,因此M. Koashi应用于肖尔 - Preskill的方法来跟踪距离准则在2009年。然而,惠普在元朗的QKDs安全开始批评从2009年,就完成了他的批评在2016年他警告安全QKDs的是不够的。此外,跟踪距离不会提供“万能组合性”,这是为了保证独立同分布(IID)键。他还提出了一个新的安全标准“误码率(BER)保证,”夏娃和她一起评估解码的消息的BER钥匙接近正确的密钥。在这项工作中,作者解释了玄的批评,并显示在BB84的BER保障的一个例子。此外,研究重访是否肖尔 - Preskill安全性证明的方法果然奏效。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号