High-Dimensional Quantum Conference Key Agreement

@article{Amer2022HighDimensionalQC,
  title={High-Dimensional Quantum Conference Key Agreement},
  author={Omar Amer and Walter O. Krawec},
  journal={2022 IEEE International Symposium on Information Theory (ISIT)},
  year={2022},
  pages={1874-1879}
}
  • Omar Amer, Walter O. Krawec
  • Published 31 January 2022
  • Computer Science, Mathematics
  • 2022 IEEE International Symposium on Information Theory (ISIT)
Quantum Conference Key Agreement (QCKA) protocols are designed to allow multiple parties to agree on a shared secret key, secure against computationally unbounded adversaries. In this paper, we consider a high-dimensional QCKA protocol and prove its information theoretic security against arbitrary, general, attacks in the finite-key scenario. Our proof technique may be useful for other high-dimensional multiparty quantum cryptographic protocols. Finally, we evaluate the protocol in a variety of… 

Figures from this paper

References

SHOWING 1-10 OF 35 REFERENCES

Quantum Conference Key Agreement: A Review

TLDR
The existing quantum CKA protocols based on multipartite entanglement are reviewed, both in the device‐dependent and the device-independent scenario.

Security of quantum key distribution using d-level systems.

TLDR
The information gained by a potential eavesdropper applying a cloning-based individual attack is derived, along with an upper bound on the error rate that ensures unconditional security against coherent attacks.

Security proof for quantum key distribution using qudit systems

TLDR
In the asymptotic regime, both the secret key rate for fixed noise and the robustness to noise increase with d, and the finite key corrections are found to be almost insensitive to d.

Security bound of two-basis quantum-key-distribution protocols using qudits (10 pages)

TLDR
An analytic expression is derived for the ultimate upper security bound of quantum-cryptography schemes that use two mutually unbiased bases, thus extending the Bennett-Brassard 1984 quantum-key-distribution scheme to higher dimensions.

High-Dimensional Semiquantum Cryptography

TLDR
It is shown that, similar to the fully quantum key distribution case, high-dimensional systems can increase the noise tolerance in the semiquantum case and several general security results are proved which are applicable to other (S)QKD protocols (both high- dimensional ones and standard qubit-based protocols) utilizing a two-way quantum channel.

Experimental quantum conference key agreement

TLDR
This work demonstrates quantum conference key agreement, a cryptography protocol leveraging multipartite entanglement to efficiently create identical keys between N users with up to N-1 rate advantage in constrained networks, and highlights a previously unexplored protocol tailored for multinode networks leveraging low-noise, long-distance transmission of GHZ states.

Multi-partite entanglement can speed up quantum key distribution in networks

TLDR
This work analyzes the security of a protocol for establishing a common secret key between N parties (i.e. a conference key), using resource states with genuine N-partite entanglement, regarding the required resources, achievable secret key rates and threshold qubit error rates.

An Introduction to Practical Quantum Key Distribution

TLDR
This tutorial serves as an introduction to basicQKD along with QKD technology from a practical perspective and is to introduce a larger set of researchers and practitioners to its study in the hopes of furthering its progress and eventual wide-scale adoption.

The security of practical quantum key distribution

TLDR
Essential theoretical tools that have been developed to assess the security of the main experimental platforms are presented (discrete- variable, continuous-variable, and distributed-phase-reference protocols).

Error tolerance of two-basis quantum key-distribution protocols using qudits and two-way classical communication

TLDR
This work obtains a sufficient condition for secret-key distillation which, in the case of isotropic quantum channels, yields an analytic expression for the maximally tolerable error rate of the cryptographic protocols under consideration.