...
首页> 外文期刊>Management science: Journal of the Institute of Management Sciences >Leftover Hashing From Quantum Error Correction: Unifying the Two Approaches to the Security Proof of Quantum Key Distribution
【24h】

Leftover Hashing From Quantum Error Correction: Unifying the Two Approaches to the Security Proof of Quantum Key Distribution

机译:来自量子纠错的剩余散列:统一量子密钥分布的安全证明的方法

获取原文
获取原文并翻译 | 示例
   

获取外文期刊封面封底 >>

       

摘要

We show that the Mayers-Shor-Preskill approach and Renner's approach to proving the security of quantum key distribution (QKD) are essentially the same. We begin our analysis by considering a special case of QKD called privacy amplification (PA). PA itself is an important building block of cryptography, both classical and quantum. The standard theoretical tool used for its security proof is called the leftover hashing lemma (LHL). We present a direct connection between the LHL and the coding theorem of a certain quantum error correction code. Then we apply this result to proving the equivalence between the two approaches to proving the security of QKD.
机译:我们表明,Mayers-Shor-Preskill方法和Renner的证明量子密钥分布(QKD)的方法基本相同。 我们通过考虑QKD称为隐私扩增(PA)的特殊情况,开始我们的分析。 PA本身是一个重要的加密块,既经典和量子。 用于其安全性证明的标准理论工具称为剩余的散列引理(LHL)。 我们在LHL和某个量子纠错码的编码定理之间存在直接连接。 然后我们应用这一结果,以证明两种方法之间的等价来证明QKD的安全性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号