2014
DOI: 10.48550/arxiv.1409.3525
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Cryptographic security of quantum key distribution

Abstract: This work is intended as an introduction to cryptographic security and a motivation for the widely used Quantum Key Distribution (QKD) security definition. We review the notion of security necessary for a protocol to be usable in a larger cryptographic context, i.e., for it to remain secure when composed with other secure protocols. We then derive the corresponding security criterion for QKD. We provide several examples of QKD composed in sequence and parallel with different cryptographic schemes to illustrate… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
122
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
3
2
2

Relationship

2
5

Authors

Journals

citations
Cited by 50 publications
(122 citation statements)
references
References 14 publications
0
122
0
Order By: Relevance
“…In heuristic approach the NS norm is a maximal guessing advantage for a distinguisher to distinguish between two devices and plays a role of a composable distance [49,62]:…”
Section: Features Of the Ns Normmentioning
confidence: 99%
See 3 more Smart Citations
“…In heuristic approach the NS norm is a maximal guessing advantage for a distinguisher to distinguish between two devices and plays a role of a composable distance [49,62]:…”
Section: Features Of the Ns Normmentioning
confidence: 99%
“…Equivalence of the complete-extension based security definition with the ensembles-based one: We show that in the NSDI scenario, in analogy to quantum cryptography [49,50], there exist two different, however equivalent definitions of security. One connected to the notion of the so-called distinguisher and the other one based on the proximity in norm [51,52].…”
mentioning
confidence: 99%
See 2 more Smart Citations
“…However, this is not the case for stand-alone security notions that are common in cryptography. To illustrate such failures of composability, let us consider the history of quantum key distribution (QKD), as recounted in [70]: QKD was originally proposed in 80s [8]. The first security proofs against unbounded adversaries followed a decade later [9,58,59,75].…”
Section: Introductionmentioning
confidence: 99%