2018
DOI: 10.1007/s11128-018-1819-8
|View full text |Cite
|
Sign up to set email alerts
|

Optimal attacks on qubit-based Quantum Key Recycling

Abstract: Quantum Key Recycling (QKR) is a quantum cryptographic primitive that allows one to reuse keys in an unconditionally secure way. By removing the need to repeatedly generate new keys, it improves communication efficiency. Škorić and de Vries recently proposed a QKR scheme based on 8-state encoding (four bases). It does not require quantum computers for encryption/decryption but only single-qubit operations. We provide a missing ingredient in the security analysis of this scheme in the case of noisy channels: ac… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
11
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
1
1

Relationship

2
0

Authors

Journals

citations
Cited by 2 publications
(11 citation statements)
references
References 23 publications
(85 reference statements)
0
11
0
Order By: Relevance
“…, where h is the binary entropy function. Both these results are more favourable than what one would expect based on the min-entropy analysis in [9] and straightforward generalisations of [1] to the noisy case.…”
Section: Contributions and Outlinementioning
confidence: 71%
See 4 more Smart Citations
“…, where h is the binary entropy function. Both these results are more favourable than what one would expect based on the min-entropy analysis in [9] and straightforward generalisations of [1] to the noisy case.…”
Section: Contributions and Outlinementioning
confidence: 71%
“…In 2017 Fehr and Salvail [1] introduced a qubit-based QKR scheme (similar to [5]) that does not need a quantum computer, and they were able to prove its security in the regime of extremely low noise.Škorić and de Vries [2] proposed a variant with 8-state encoding, which drastically reduces the need for privacy amplification and tolerates higher noise levels, but the security was not proven. Attacks on the qubit-based QKR schemes of [1,2] were studied in [9], but that did not yield a security proof.…”
Section: Quantum Key Recyclingmentioning
confidence: 99%
See 3 more Smart Citations