# Key-Rate Bound of a Semi-Quantum Protocol Using an Entropic Uncertainty Relation

@article{Krawec2018KeyRateBO, title={Key-Rate Bound of a Semi-Quantum Protocol Using an Entropic Uncertainty Relation}, author={Walter O. Krawec}, journal={2018 IEEE International Symposium on Information Theory (ISIT)}, year={2018}, pages={2669-2673} }

In this paper we present a new proof technique for semi-quantum key distribution (SQKD) protocols which makes use of a quantum entropic uncertainty relation to bound an adversary's information. We develop several new techniques for analyzing SQKD protocols; furthermore, our new proof may hold application in the security analysis of other semi-quantum protocols or protocols relying on two-way quantum communication.

## 9 Citations

### From Classical to Semi-Quantum Secure Communication

- Computer Science, Mathematics2019 IEEE International Symposium on Information Theory (ISIT)
- 2019

In this work we introduce a novel QKD protocol capable of smoothly transitioning, via a user-tuneable parameter, from classical to semi-quantum in order to help understand the effect of quantum…

### High-Dimensional Semi-Quantum Cryptography

- Computer Science, Mathematics
- 2019

It is shown that, similar to the fully-Quantum key distribution case, high-dimensional systems can increase the noise tolerance in the semi-quantum case.

### Mediated semi-quantum key distribution with improved efficiency

- Computer Science, Mathematics
- 2022

A new mediated semi-quantum key distribution protocol is introduced, extending prior work, which has asymptotically perfect efficiency though this comes at the cost of decreased noise tolerance, and is backwards compatible with prior work.

### Single-state semi-quantum key distribution protocol and its security proof

- Computer Science, MathematicsInternational Journal of Quantum Information
- 2020

This paper presents a new SQKD protocol that is secure against a restricted collective attack by computing a lower bound of the key rate in the asymptotic scenario, and proves that it is more efficient than the existing single-state SQKKD protocols by introducing an efficiency parameter.

### High-Dimensional Semiquantum Cryptography

- Computer ScienceIEEE Transactions on Quantum Engineering
- 2020

It is shown that, similar to the fully quantum key distribution case, high-dimensional systems can increase the noise tolerance in the semiquantum case and several general security results are proved which are applicable to other (S)QKD protocols (both high- dimensional ones and standard qubit-based protocols) utilizing a two-way quantum channel.

### Semiquantum key distribution with high quantum noise tolerance

- Computer Science, PhysicsPhysical Review A
- 2019

A new semi-quantum key distribution (SQKD) protocol is constructed which actually takes advantage of this necessary two-way channel, and it is shown it is able to tolerate a channel noise level higher than any prior SQKD protocol to-date.

### Security Proof Against Collective Attacks for an Experimentally Feasible Semi-Quantum Key Distribution Protocol

- Computer Science, MathematicsArXiv
- 2020

The security of the Mirror protocol is proved against a wide class of quantum attacks (the "collective attacks") and the resulting key rate is evaluated.

### Semi-quantum cryptography

- Computer Science, PhysicsQuantum Inf. Process.
- 2020

The history and current state-of-the-art in semi-quantum research is surveyed, including security proof methods and how classical post-processing can be used to counteract users' inability to perform certain quantum operations.

### Joint photon-number splitting attack on semi-quantum key distribution

- Physics, Computer ScienceFrontiers in Physics
- 2022

It seems that practical single-state semi-quantum key distribution can overcome photon-number splitting attack due to the SIRT bits (also known as the “sifted key”), however, its dual-channel feature still opens up an observation window to Eve.

## References

SHOWING 1-10 OF 29 REFERENCES

### Limited Resource Semi-Quantum Key Distribution

- Computer Science, Mathematics
- 2017

A new SQKD protocol where the quantum user is also limited in her measurement capabilities is presented, its security is proved, and its noise tolerance is as high as "fully quantum" QKD protocols.

### Security proof of a semi-quantum key distribution protocol

- Computer Science, Mathematics2015 IEEE International Symposium on Information Theory (ISIT)
- 2015

This paper proves the unconditional security of a particular semi-quantum protocol and derive an expression for its key rate, in the asymptotic scenario.

### Quantum key distribution with quantum walks

- Computer Science, MathematicsQuantum Inf. Process.
- 2018

This paper introduces a secure quantum key distribution protocol equipped with verification procedures against full man-in-the-middle attacks, and presents a one-way protocol and proves its security.

### Security of a semi-quantum protocol where reflections contribute to the secret key

- Computer Science, MathematicsQuantum Inf. Process.
- 2016

In this work, a complete proof of security is provided by deriving a lower bound of the protocol’s key rate in the asymptotic scenario and finding an error threshold value such that for all error rates less than this threshold, it is guaranteed that A and B may distill a secure secret key.

### Mediated semiquantum key distribution

- Computer Science, Mathematics
- 2015

This paper designs a new quantum key distribution protocol, allowing two limited semi-quantum or "classical" users to establish a shared secret key with the help of a fully quantum server and proves the unconditional security of this protocol even in the worst case: when this quantum server is an all-powerful adversary.

### Authenticated semi-quantum key distribution protocol using Bell states

- Computer ScienceQuantum Inf. Process.
- 2014

This study presents the first authenticated semi-quantum key distribution (ASQKD) protocols without using authenticated classical channels, enabling establishment of a key hierarchy in security systems that also eases the key management problem.

### RELATION BETWEEN INFORMATION AND DISTURBANCE IN QUANTUM KEY DISTRIBUTION PROTOCOL WITH CLASSICAL ALICE

- Computer Science
- 2011

The "semiquantum" key distribution protocol introduced by Zou et al. is examined and a trade-off inequality between information gained by Eve and the disturbance observed by legitimate users is derived.

### Restricted attacks on semi-quantum key distribution protocols

- Mathematics, Computer ScienceQuantum Inf. Process.
- 2014

A new single-state protocol that permits “reflections” to carry information is described and the results concerning restricted attacks to show its robustness are used.

### Security of two-way quantum key distribution

- Computer Science
- 2013

This work provides a strategy to prove security for two-way quantum key distribution protocols against the most general quantum attack possible by an eavesdropper, and shows that a two- way protocol can outperform comparable one-way protocols.

### Single-state semi-quantum key distribution protocol and its security proof

- Computer Science, MathematicsInternational Journal of Quantum Information
- 2020

This paper presents a new SQKD protocol that is secure against a restricted collective attack by computing a lower bound of the key rate in the asymptotic scenario, and proves that it is more efficient than the existing single-state SQKKD protocols by introducing an efficiency parameter.