首页> 外文会议>Quantum information science and technology III >On problems in security of quantum key distribution raised by Yuen
【24h】

On problems in security of quantum key distribution raised by Yuen

机译:关于袁提出的量子密钥分配安全性问题

获取原文
获取原文并翻译 | 示例

摘要

In 2007, it was found that Known-Plaintext-Attack would reveal whole the string of the distributed key by Quantum Key Distribution (QKD) when the part of the plaintext was known to the eavesdropper, Eve, under the mutual information security criterion between Eve and legitimate users, Alice and Bob. To overcome, the trace distance criterion was introduced in the paper that the distance between the distributed quantum state and the ideal quantum state with Eve's quantum system decoupled from the quantum systems shared by Alice and Bob. On the other hand, Shor and Preskill proved in 2000 that entanglement-based QKDs are equivalent to prepare-and-measure QKDs, such as the first QKD, BB84. Their proof employed the mutual information criterion, therefore M. Koashi applied Shor-Preskill approach to the trace distance criterion in 2009. However, H. P. Yuen started criticisms on the security of QKDs from 2009, then completed his criticisms in 2016. He warned the security of QKDs are not sufficient. Furthermore, the trace distance would not provide "universal composability", which is supposed to guarantee Independent and Identically Distributed (IID) keys. He also proposed a new security criterion "Bit-Error-Rate (BER) guarantee," to evaluate the BER in the decoded message by Eve with her key close to the correct key. In this work, the author explains Yuen's criticisms and shows an example of the BER guarantee on BB84. Furthermore, the study revisits whether Shor-Preskill security proof approach really worked.
机译:在2007年,根据Eve之间的相互信息安全标准,当窃听者Eve知道明文的一部分时,已知量子文本攻击将通过量子密钥分发(QKD)揭示整个分布式密钥的字符串。以及合法用户Alice和Bob。为了克服这一问题,在论文中引入了迹线距离准则,即从Elice量子系统中分离出的量子态与理想量子态之间的距离与Alice和Bob共享的量子系统解耦。另一方面,Shor和Preskill在2000年证明,基于纠缠的QKD等同于准备和测量的QKD,例如第一个QKD,BB84。他们的证明采用了互信息标准,因此M. Koashi在2009年将Shor-Preskill方法应用于跟踪距离标准。但是,HP Yuen从2009年开始对QKD的安全性提出批评,然后在2016年完成对他的批评。他警告了安全性。 QKD数量不够。此外,走线距离不会提供“通用可组合性”,这应该保证独立和相同分布(IID)密钥。他还提出了新的安全标准“误码率(BER)保证”,以评估Eve在密钥接近正确密钥的情况下解码消息中的BER。在本文中,作者解释了Yuen的批评,并举例说明了BB84的BER保证。此外,该研究还回顾了Shor-Preskill安全证明方法是否真的有效。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号