# A largely self-contained and complete security proof for quantum key distribution

@article{Tomamichel2015ALS, title={A largely self-contained and complete security proof for quantum key distribution}, author={Marco Tomamichel and Anthony Leverrier}, journal={arXiv: Quantum Physics}, year={2015} }

In this work we present a security analysis for quantum key distribution, establishing a rigorous tradeoff between various protocol and security parameters for a class of entanglement-based and prepare-and-measure protocols. The goal of this paper is twofold: 1) to review and clarify the state-of-the-art security analysis based on entropic uncertainty relations, and 2) to provide an accessible resource for researchers interested in a security analysis of quantum cryptographic protocols that…

## Figures and Tables from this paper

## 56 Citations

Simple proof of confidentiality for private quantum channels in noisy environments

- Computer Science, PhysicsQuantum Science and Technology
- 2019

A simple proof of confidentiality for parallel quantum channels established via entanglement distillation based on hashing, in the presence of noise, and a malicious eavesdropper who is restricted only by the laws of quantum mechanics is provided.

Finite-key security analysis for multilevel quantum key distribution

- Computer Science, Physics
- 2015

A detailed security analysis of a d-dimensional quantum key distribution protocol based on two and three mutually unbiased bases (MUBs) both in an asymptotic and finite key length scenario and the possibility of an experimental realization of the 3-MUB QKD protocol with the orbital angular momentum degrees of freedom of photons is discussed.

Device-independent quantum key distribution with random key basis

- Physics, MedicineNature communications
- 2021

This work significantly narrows the gap between the theory and practice of DIQKD with a simple variant of the original protocol based on the celebrated Clauser-Horne-Shimony-Holt (CHSH) Bell inequality, and shows that the proposed protocol significantly improves over the original DIZKD protocol, enabling positive keys in the high noise regime for the first time.

On the Everlasting Security of Password-Authenticated Quantum Key Exchange

- Computer Science, PhysicsArXiv
- 2019

This paper investigates the possibility of implementing this authenticated classical channel by the means of human-memorable passwords and presents a construction of a quantum PAKE scheme based on QKD, and proves its everlasting security in this simulation-based model.

Quantum Key Distribution in the Non-Asymptotic Regime

- Physics, Mathematics
- 2015

This is a Bachelor's thesis on quantum key distribution in the non-asymptotic regime submitted to the Leibniz Universit\"at Hannover, Germany. It deals with the question how to generate a key to…

Robust protocols for securely expanding randomness and distributing keys using untrusted quantum devices

- Physics, MathematicsSTOC
- 2014

This work shows how to expand a random seed at an exponential rate without trusting the underlying quantum devices, and has the following new features: tolerating a constant level of implementation imprecision, requiring only a unit size quantum memory per device component for the honest implementation, and allowing a large natural class of constructions.

Quantum key distribution with any two independent and identically distributed states

- Physics
- 2020

To prove the security of quantum key distribution (QKD) protocols, several assumptions have to be imposed on users' devices. From an experimental point of view, it is preferable that such theoretical…

Second-order coding rates for key distillation in quantum key distribution

- Computer Science, PhysicsArXiv
- 2019

The main result is a formula that characterizes the backoff from the known asymptotic formula for key distillation, which incorporates the reliability and security of the protocol, as well as the mutual information variances to the legitimate receiver and the eavesdropper.

Challenges for a DIQKD implementation

- 2017

Quantum key distribution (QKD) is the paradigmatic example of quantum cryptography. The possibility of exploring quantum properties of systems permits to achieve unconditional security in the…

On the Security of Password-Authenticated Quantum Key Exchange

- Computer Science
- 2019

This paper investigates the achievability of unconditionally secure password-authenticated quantum key exchange (quantum PAKE), where the authentication is implemented by the means of human-memorable passwords, and presents a construction for quantum PAKE that provably achieves everlasting security in the simulation-based model.

## References

SHOWING 1-10 OF 48 REFERENCES

Postselection technique for quantum channels with applications to quantum cryptography.

- Computer Science, MedicinePhysical review letters
- 2009

A general method for studying properties of quantum channels acting on an n-partite system, whose action is invariant under permutations of the subsystems, and a simple proof for the fact that security of a discrete-variable quantum key distribution protocol against collective attacks implies security of the protocol against the most general attacks.

Efficient Quantum Key Distribution Scheme
and a Proof of Its Unconditional Security

- Mathematics, PhysicsJournal of Cryptology
- 2004

A simple modification that essentially doubles the efficiency of the BB84 quantum key distribution scheme and guarantees the security of the scheme against the most general eavesdropping strategy is devised, generalizing Shor and Preskill's proof of security of BB84.

Finite-key security against coherent attacks in quantum key distribution

- Physics, Mathematics
- 2010

Christandl et al (2009 Phys. Rev. Lett. 102 020504) provide, in particular, the possibility of studying unconditional security in the finite-key regime for all discrete-variable protocols. We spell…

Cryptographic security of quantum key distribution

- Physics, Computer ScienceArXiv
- 2014

This work provides several examples of QKD composed in sequence and parallel with different cryptographic schemes to illustrate how the error of a composed protocol is the sum of the errors of the individual protocols.

A monogamy-of-entanglement game with applications to device-independent quantum cryptography

- Physics
- 2013

We consider a game in which two separate laboratories collaborate to prepare a quantum system and are then asked to guess the outcome of a measurement performed by a third party in a random basis on…

Simple proof of security of the BB84 quantum key distribution protocol

- Computer Science, MedicinePhysical review letters
- 2000

We prove that the 1984 protocol of Bennett and Brassard (BB84) for quantum key distribution is secure. We first give a key distribution protocol based on entanglement purification, which can be…

Tight finite-key analysis for quantum cryptography

- Computer Science, MedicineNature communications
- 2012

Here it is shown that gaps between theory and experiment can be simultaneously overcome by using a recently developed proof technique based on the uncertainty relation for smooth entropies.

Quantum cryptography with finite resources: unconditional security bound for discrete-variable protocols with one-way postprocessing.

- Computer Science, PhysicsPhysical review letters
- 2008

A bound for the security of quantum key distribution with finite resources under one-way postprocessing is derived, based on a definition of security that is composable and has an operational meaning, for standard protocols such as Bennett-Brassard 1984 and six-states protocol.

Concise and tight security analysis of the Bennett-Brassard 1984 protocol with finite key lengths

- Physics
- 2012

We present a tight security analysis of the Bennett–Brassard 1984 protocol taking into account the finite-size effect of key distillation and achieving unconditional security. We begin by presenting…

Fundamental finite key limits for information reconciliation in quantum key distribution

- Computer ScienceISIT
- 2014

It is found that an often used approximation for the information leakage during one-way information reconciliation is flawed and an improved estimate is proposed and proposed.