首页> 外文期刊>New journal of physics >Sifting attacks in finite-size quantum key distribution
【24h】

Sifting attacks in finite-size quantum key distribution

机译:有限大小量子密钥分发中的筛选攻击

获取原文
           

摘要

A central assumption in quantum key distribution (QKD) is that Eve has no knowledge about which rounds will be used for parameter estimation or key distillation. Here we show that this assumption is violated for iterative sifting, a sifting procedure that has been employed in some (but not all) of the recently suggested QKD protocols in order to increase their efficiency. We show that iterative sifting leads to two security issues: (1) some rounds are more likely to be key rounds than others, (2) the public communication of past measurement choices changes this bias round by round. We analyze these two previously unnoticed problems, present eavesdropping strategies that exploit them, and find that the two problems are independent. We discuss some sifting protocols in the literature that are immune to these problems. While some of these would be inefficient replacements for iterative sifting, we find that the sifting subroutine of an asymptotically secure protocol suggested by Lo et al (2005 J. Cryptol. 18 133–65), which we call LCA sifting, has an efficiency on par with that of iterative sifting. One of our main results is to show that LCA sifting can be adapted to achieve secure sifting in the finite-key regime. More precisely, we combine LCA sifting with a certain parameter estimation protocol, and we prove the finite-key security of this combination. Hence we propose that LCA sifting should replace iterative sifting in future QKD implementations. More generally, we present two formal criteria for a sifting protocol that guarantee its finite-key security. Our criteria may guide the design of future protocols and inspire a more rigorous QKD analysis, which has neglected sifting-related attacks so far.
机译:量子密钥分配(QKD)中的一个中心假设是,夏娃不知道哪些轮次将用于参数估计或密钥蒸馏。在这里,我们表明迭代筛选违反了这一假设,迭代筛选已在最近建议的某些QKD协议中(但不是全部)采用,以提高其效率。我们表明,迭代筛选会导致两个安全问题:(1)一些回合比其他回合更可能是关键回合;(2)过去的度量选择的公开交流逐步改变了这种偏见。我们分析了这两个以前未注意到的问题,提出了利用它们的窃听策略,并发现这两个问题是独立的。我们在文献中讨论了一些不受这些问题影响的筛选方案。尽管其中一些可能无法有效替代迭代筛选,但我们发现Lo等人(2005 J. Cryptol。18 133-65)建议的渐近安全协议的筛选子例程在LCA筛选上具有较高的效率。与迭代筛选相提并论。我们的主要结果之一是表明,可以对LCA筛选进行调整,以在有限键体制中实现安全的筛选。更准确地说,我们将LCA筛选与某个参数估计协议相结合,并且证明了这种组合的有限密钥安全性。因此,我们建议在未来的QKD实现中,LCA筛选应替代迭代筛选。更笼统地说,我们为筛选协议提出了两个正式标准,以保证其有限键安全性。我们的标准可能会指导将来协议的设计,并激发出更加严格的QKD分析,该分析迄今已忽略了与筛选相关的攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号