Key-Rate Bound of a Semi-Quantum Protocol Using an Entropic Uncertainty Relation

@article{Krawec2018KeyRateBO,
  title={Key-Rate Bound of a Semi-Quantum Protocol Using an Entropic Uncertainty Relation},
  author={Walter O. Krawec},
  journal={2018 IEEE International Symposium on Information Theory (ISIT)},
  year={2018},
  pages={2669-2673}
}
  • Walter O. Krawec
  • Published 2 January 2018
  • Computer Science
  • 2018 IEEE International Symposium on Information Theory (ISIT)
In this paper we present a new proof technique for semi-quantum key distribution (SQKD) protocols which makes use of a quantum entropic uncertainty relation to bound an adversary's information. We develop several new techniques for analyzing SQKD protocols; furthermore, our new proof may hold application in the security analysis of other semi-quantum protocols or protocols relying on two-way quantum communication. 

Figures from this paper

From Classical to Semi-Quantum Secure Communication

In this work we introduce a novel QKD protocol capable of smoothly transitioning, via a user-tuneable parameter, from classical to semi-quantum in order to help understand the effect of quantum

High-Dimensional Semi-Quantum Cryptography

TLDR
It is shown that, similar to the fully-Quantum key distribution case, high-dimensional systems can increase the noise tolerance in the semi-quantum case.

Mediated semi-quantum key distribution with improved efficiency

TLDR
A new mediated semi-quantum key distribution protocol is introduced, extending prior work, which has asymptotically perfect efficiency though this comes at the cost of decreased noise tolerance, and is backwards compatible with prior work.

Single-state semi-quantum key distribution protocol and its security proof

  • Wei ZhangDaowen Qiu
  • Computer Science, Mathematics
    International Journal of Quantum Information
  • 2020
TLDR
This paper presents a new SQKD protocol that is secure against a restricted collective attack by computing a lower bound of the key rate in the asymptotic scenario, and proves that it is more efficient than the existing single-state SQKKD protocols by introducing an efficiency parameter.

High-Dimensional Semiquantum Cryptography

TLDR
It is shown that, similar to the fully quantum key distribution case, high-dimensional systems can increase the noise tolerance in the semiquantum case and several general security results are proved which are applicable to other (S)QKD protocols (both high- dimensional ones and standard qubit-based protocols) utilizing a two-way quantum channel.

Security Proof Against Collective Attacks for an Experimentally Feasible Semi-Quantum Key Distribution Protocol

TLDR
The security of the Mirror protocol is proved against a wide class of quantum attacks (the "collective attacks") and the resulting key rate is evaluated.

Semi-quantum cryptography

TLDR
The history and current state-of-the-art in semi-quantum research is surveyed, including security proof methods and how classical post-processing can be used to counteract users' inability to perform certain quantum operations.

Semiquantum key distribution with high quantum noise tolerance

TLDR
A new semi-quantum key distribution (SQKD) protocol is constructed which actually takes advantage of this necessary two-way channel, and it is shown it is able to tolerate a channel noise level higher than any prior SQKD protocol to-date.

References

SHOWING 1-10 OF 29 REFERENCES

Limited Resource Semi-Quantum Key Distribution

TLDR
A new SQKD protocol where the quantum user is also limited in her measurement capabilities is presented, its security is proved, and its noise tolerance is as high as "fully quantum" QKD protocols.

Security proof of a semi-quantum key distribution protocol

  • Walter O. Krawec
  • Computer Science, Mathematics
    2015 IEEE International Symposium on Information Theory (ISIT)
  • 2015
TLDR
This paper proves the unconditional security of a particular semi-quantum protocol and derive an expression for its key rate, in the asymptotic scenario.

Security of a semi-quantum protocol where reflections contribute to the secret key

TLDR
In this work, a complete proof of security is provided by deriving a lower bound of the protocol’s key rate in the asymptotic scenario and finding an error threshold value such that for all error rates less than this threshold, it is guaranteed that A and B may distill a secure secret key.

Mediated semiquantum key distribution

TLDR
This paper designs a new quantum key distribution protocol, allowing two limited semi-quantum or "classical" users to establish a shared secret key with the help of a fully quantum server and proves the unconditional security of this protocol even in the worst case: when this quantum server is an all-powerful adversary.

Authenticated semi-quantum key distribution protocol using Bell states

TLDR
This study presents the first authenticated semi-quantum key distribution (ASQKD) protocols without using authenticated classical channels, enabling establishment of a key hierarchy in security systems that also eases the key management problem.

Restricted attacks on semi-quantum key distribution protocols

TLDR
A new single-state protocol that permits “reflections” to carry information is described and the results concerning restricted attacks to show its robustness are used.

Security of two-way quantum key distribution

TLDR
This work provides a strategy to prove security for two-way quantum key distribution protocols against the most general quantum attack possible by an eavesdropper, and shows that a two- way protocol can outperform comparable one-way protocols.

Single-state semi-quantum key distribution protocol and its security proof

  • Wei ZhangDaowen Qiu
  • Computer Science, Mathematics
    International Journal of Quantum Information
  • 2020
TLDR
This paper presents a new SQKD protocol that is secure against a restricted collective attack by computing a lower bound of the key rate in the asymptotic scenario, and proves that it is more efficient than the existing single-state SQKKD protocols by introducing an efficiency parameter.

Information-theoretic security proof for quantum-key-distribution protocols (17 pages)

TLDR
This work investigates a general class of QKD protocols with one-way classical post-processing and gives new lower and upper bounds on the secret-key rate which only involve entropies of two-qubit density operators and which are thus easy to compute.

Quantum key distribution with mismatched measurements over arbitrary channels

TLDR
This paper derives key-rate expressions for different quantum key distribution protocols from multiple channel statistics, including those gathered from mismatched measurement bases, and demonstrates that their tolerance to noise is higher than previously thought.