A largely self-contained and complete security proof for quantum key distribution

@article{Tomamichel2015ALS,
  title={A largely self-contained and complete security proof for quantum key distribution},
  author={Marco Tomamichel and Anthony Leverrier},
  journal={arXiv: Quantum Physics},
  year={2015}
}
In this work we present a security analysis for quantum key distribution, establishing a rigorous tradeoff between various protocol and security parameters for a class of entanglement-based and prepare-and-measure protocols. The goal of this paper is twofold: 1) to review and clarify the state-of-the-art security analysis based on entropic uncertainty relations, and 2) to provide an accessible resource for researchers interested in a security analysis of quantum cryptographic protocols that… Expand
Simple proof of confidentiality for private quantum channels in noisy environments
TLDR
A simple proof of confidentiality for parallel quantum channels established via entanglement distillation based on hashing, in the presence of noise, and a malicious eavesdropper who is restricted only by the laws of quantum mechanics is provided. Expand
Finite-key security analysis for multilevel quantum key distribution
TLDR
A detailed security analysis of a d-dimensional quantum key distribution protocol based on two and three mutually unbiased bases (MUBs) both in an asymptotic and finite key length scenario and the possibility of an experimental realization of the 3-MUB QKD protocol with the orbital angular momentum degrees of freedom of photons is discussed. Expand
Device-independent quantum key distribution with random key basis
TLDR
This work significantly narrows the gap between the theory and practice of DIQKD with a simple variant of the original protocol based on the celebrated Clauser-Horne-Shimony-Holt (CHSH) Bell inequality, and shows that the proposed protocol significantly improves over the original DIZKD protocol, enabling positive keys in the high noise regime for the first time. Expand
On the Everlasting Security of Password-Authenticated Quantum Key Exchange
TLDR
This paper investigates the possibility of implementing this authenticated classical channel by the means of human-memorable passwords and presents a construction of a quantum PAKE scheme based on QKD, and proves its everlasting security in this simulation-based model. Expand
Quantum Key Distribution in the Non-Asymptotic Regime
This is a Bachelor's thesis on quantum key distribution in the non-asymptotic regime submitted to the Leibniz Universit\"at Hannover, Germany. It deals with the question how to generate a key toExpand
Robust protocols for securely expanding randomness and distributing keys using untrusted quantum devices
TLDR
This work shows how to expand a random seed at an exponential rate without trusting the underlying quantum devices, and has the following new features: tolerating a constant level of implementation imprecision, requiring only a unit size quantum memory per device component for the honest implementation, and allowing a large natural class of constructions. Expand
Quantum key distribution with any two independent and identically distributed states
To prove the security of quantum key distribution (QKD) protocols, several assumptions have to be imposed on users' devices. From an experimental point of view, it is preferable that such theoreticalExpand
Second-order coding rates for key distillation in quantum key distribution
TLDR
The main result is a formula that characterizes the backoff from the known asymptotic formula for key distillation, which incorporates the reliability and security of the protocol, as well as the mutual information variances to the legitimate receiver and the eavesdropper. Expand
Challenges for a DIQKD implementation
Quantum key distribution (QKD) is the paradigmatic example of quantum cryptography. The possibility of exploring quantum properties of systems permits to achieve unconditional security in theExpand
On the Security of Password-Authenticated Quantum Key Exchange
TLDR
This paper investigates the achievability of unconditionally secure password-authenticated quantum key exchange (quantum PAKE), where the authentication is implemented by the means of human-memorable passwords, and presents a construction for quantum PAKE that provably achieves everlasting security in the simulation-based model. Expand
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 48 REFERENCES
Postselection technique for quantum channels with applications to quantum cryptography.
TLDR
A general method for studying properties of quantum channels acting on an n-partite system, whose action is invariant under permutations of the subsystems, and a simple proof for the fact that security of a discrete-variable quantum key distribution protocol against collective attacks implies security of the protocol against the most general attacks. Expand
Efficient Quantum Key Distribution Scheme and a Proof of Its Unconditional Security
TLDR
A simple modification that essentially doubles the efficiency of the BB84 quantum key distribution scheme and guarantees the security of the scheme against the most general eavesdropping strategy is devised, generalizing Shor and Preskill's proof of security of BB84. Expand
Finite-key security against coherent attacks in quantum key distribution
Christandl et al (2009 Phys. Rev. Lett. 102 020504) provide, in particular, the possibility of studying unconditional security in the finite-key regime for all discrete-variable protocols. We spellExpand
Cryptographic security of quantum key distribution
TLDR
This work provides several examples of QKD composed in sequence and parallel with different cryptographic schemes to illustrate how the error of a composed protocol is the sum of the errors of the individual protocols. Expand
A monogamy-of-entanglement game with applications to device-independent quantum cryptography
We consider a game in which two separate laboratories collaborate to prepare a quantum system and are then asked to guess the outcome of a measurement performed by a third party in a random basis onExpand
Simple proof of security of the BB84 quantum key distribution protocol
  • Shor, Preskill
  • Computer Science, Medicine
  • Physical review letters
  • 2000
We prove that the 1984 protocol of Bennett and Brassard (BB84) for quantum key distribution is secure. We first give a key distribution protocol based on entanglement purification, which can beExpand
Tight finite-key analysis for quantum cryptography
TLDR
Here it is shown that gaps between theory and experiment can be simultaneously overcome by using a recently developed proof technique based on the uncertainty relation for smooth entropies. Expand
Quantum cryptography with finite resources: unconditional security bound for discrete-variable protocols with one-way postprocessing.
TLDR
A bound for the security of quantum key distribution with finite resources under one-way postprocessing is derived, based on a definition of security that is composable and has an operational meaning, for standard protocols such as Bennett-Brassard 1984 and six-states protocol. Expand
Concise and tight security analysis of the Bennett-Brassard 1984 protocol with finite key lengths
We present a tight security analysis of the Bennett–Brassard 1984 protocol taking into account the finite-size effect of key distillation and achieving unconditional security. We begin by presentingExpand
Fundamental finite key limits for information reconciliation in quantum key distribution
TLDR
It is found that an often used approximation for the information leakage during one-way information reconciliation is flawed and an improved estimate is proposed and proposed. Expand
...
1
2
3
4
5
...