2005
DOI: 10.1103/physreva.72.012332
|View full text |Cite
|
Sign up to set email alerts
|

Information-theoretic security proof for quantum-key-distribution protocols

Abstract: We present a technique for proving the security of quantum-key-distribution ͑QKD͒ protocols. It is based on direct information-theoretic arguments and thus also applies if no equivalent entanglement purification scheme can be found. Using this technique, we investigate a general class of QKD protocols with one-way classical post-processing. We show that, in order to analyze the full security of these protocols, it suffices to consider collective attacks. Indeed, we give new lower and upper bounds on the secret… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

16
635
1

Year Published

2007
2007
2018
2018

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 461 publications
(652 citation statements)
references
References 22 publications
16
635
1
Order By: Relevance
“…An example from the field of quantum information may be found in Kraus et al (2005) and Renner et al (2005), where the security of a quantum secret key is increased by adding a small amount of randomness to the key during the privacy amplification stage of the protocol. This can be understood in two ways.…”
Section: Discussionmentioning
confidence: 99%
“…An example from the field of quantum information may be found in Kraus et al (2005) and Renner et al (2005), where the security of a quantum secret key is increased by adding a small amount of randomness to the key during the privacy amplification stage of the protocol. This can be understood in two ways.…”
Section: Discussionmentioning
confidence: 99%
“…[9,10]. Here, we limit ourselves to the asymptotic key limit as the number of entries n in the raw key y tend to infinity.…”
Section: The Secret Key Rate In the Infinite Key Limitmentioning
confidence: 99%
“…We consider the class of collective attacks [9,10], thereby limiting Eve's possible interaction with the signal states. In this scenario, Eve can only interact with each signal individually, but she can store these quantum states for later usage.…”
Section: Introductionmentioning
confidence: 99%
“…It can successfully perform MITM attacks against public key cryptosystems (using the first capability) and against unauthenticated QKD (using the second capability) but not against a QKD link between two uncompromised nodes that share a secret key for authentication (since quantum mechanics allows the eavesdropping to be detected) [10]. The adversary can always perform denial-ofservice (DOS) attacks by simply destroying all transmitted information; since DOS attacks cannot be prevented in this adversarial scenario, we concern ourselves only with security against MITM attacks and do not consider robustness against DOS attacks further.…”
Section: Adversarial Capabilitiesmentioning
confidence: 99%