Optimal attacks on qubit-based quantum key recycling

From MaRDI portal
Publication:1746889

DOI10.1007/S11128-018-1819-8zbMATH Open1386.81055arXiv1704.04690OpenAlexW2608068658MaRDI QIDQ1746889FDOQ1746889


Authors: Daan Leermakers, Boris Škorić Edit this on Wikidata


Publication date: 26 April 2018

Published in: Quantum Information Processing (Search for Journal in Brave)

Abstract: Quantum Key Recycling (QKR) is a quantum-cryptographic primitive that allows one to re-use keys in an unconditionally secure way. By removing the need to repeatedly generate new keys it improves communication efficiency. Skoric and de Vries recently proposed a QKR scheme based on 8-state encoding (four bases). It does not require quantum computers for encryption/decryption but only single-qubit operations. We provide a missing ingredient in the security analysis of this scheme in the case of noisy channels: accurate bounds on the privacy amplification. We determine optimal attacks against the message and against the key, for 8-state encoding as well as 4-state and 6-state conjugate coding. We show that the Shannon entropy analysis for 8-state encoding reduces to the analysis of Quantum Key Distribution, whereas 4-state and 6-state suffer from additional leaks that make them less effective. We also provide results in terms of the min-entropy. Overall, 8-state encoding yields the highest capacity.


Full work available at URL: https://arxiv.org/abs/1704.04690




Recommendations




Cites Work


Cited In (6)

Uses Software





This page was built for publication: Optimal attacks on qubit-based quantum key recycling

Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1746889)