Proof of security of quantum key distribution with two-way classical communications
From MaRDI portal
Publication:4679922
DOI10.1109/TIT.2002.807289zbMATH Open1063.94081arXivquant-ph/0105121OpenAlexW2165923712MaRDI QIDQ4679922FDOQ4679922
Authors: Hoi-Kwong Lo, Daniel Gottesman
Publication date: 31 May 2005
Published in: IEEE Transactions on Information Theory (Search for Journal in Brave)
Abstract: Shor and Preskill have provided a simple proof of security of the standard quantum key distribution scheme by Bennett and Brassard (BB84) by demonstrating a connection between key distribution and entanglement purification protocols with one-way communications. Here we provide proofs of security of standard quantum key distribution schemes, BB84 and the six-state scheme, against the most general attack, by using the techniques of *two*-way entanglement purification. We demonstrate clearly the advantage of classical post-processing with two-way classical communications over classical post-processing with only one-way classical communications in QKD. This is done by the explicit construction of a new protocol for (the error correction/detection and privacy amplification of) BB84 that can tolerate a bit error rate of up to 18.9%, which is higher than what any BB84 scheme with only one-way classical communications can possibly tolerate. Moreover, we demonstrate the advantage of the six-state scheme over BB84 by showing that the six-state scheme can strictly tolerate a higher bit error rate than BB84. In particular, our six-state protocol can tolerate a bit error rate of 26.4%, which is higher than the upper bound of 25% bit error rate for any secure BB84 protocol. Consequently, our protocols may allow higher key generation rate and remain secure over longer distances than previous protocols. Our investigation suggests that two-way entanglement purification is a useful tool in the study of advantage distillation, error correction, and privacy amplification protocols.
Full work available at URL: https://arxiv.org/abs/quant-ph/0105121
Recommendations
- Proof of unconditional security of six-state quantum key distribution scheme
- Efficient quantum key distribution scheme and a proof of its unconditional security
- Improved one-way rates for BB84 and 6-state protocols
- Security of quantum key distribution with imperfect devices
- Security of practical BB84 quantum key distribution
Cited In (45)
- Proof of unconditional security of six-state quantum key distribution scheme
- Chau-Wang-Wong17 scheme is experimentally more feasible than the six-state scheme
- Towards secure quantum key distribution protocol for wireless LANs: a hybrid approach
- Monitoring the intercept-resend attack with the weak measurement model
- The Locking-Decoding Frontier for Generic Dynamics
- Individual attacks with generalized discrimination and inadequacy of some information measures
- Practical entanglement distillation scheme using recurrence method and quantum low density parity check codes
- Independent attacks in imperfect settings: a case for a two-way quantum key distribution scheme
- Indistinguishability of pure orthogonal product states by LOCC
- Role of Bell-CHSH violation and local filtering in quantum key distribution
- NOTES ON THE FIDELITY OF SYMPLECTIC QUANTUM ERROR-CORRECTING CODES
- Hopf cyclic cohomology and Chern character of equivariant \(K\)-theories
- Two-way quantum key distribution in a uniformly distributed quantum space via a special mapping and its analytical security proofs
- The minimum distance problem for two-way entanglement purification
- A novel quantum dragonfly multi-key exchange protocol beyond conventional attacks
- Controlled probabilistic quantum key distribution using a ground state
- Operator structures and quantum one-way LOCC conditions
- Asymptotic correctability of Bell-diagonal quantum states and maximum tolerable bit-error rates
- Quantum Bell states-based anonymous voting with anonymity trace
- Improving the security of protocols of quantum key agreement solely using Bell states and Bell measurement
- Symmetric extension and its application in QKD
- SECURE DIRECT COMMUNICATION USING DETERMINISTIC BB84 PROTOCOL
- The locking-decoding frontier for generic dynamics
- Improved one-way rates for BB84 and 6-state protocols
- Verification of quantum protocols with a probabilistic model-checker
- Reliability of Calderbank–Shor–Steane codes and security of quantum key distribution
- Everything you always wanted to know about LOCC (but were afraid to ask)
- Frequency shift attack on ‘plug-and-play’ quantum key distribution systems
- Security Bounds for Quantum Cryptography with Finite Resources
- THE PHYSICS OF QUANTUM INFORMATION: COMPLEMENTARITY, UNCERTAINTY, AND ENTANGLEMENT
- Optimal axis compensation in quantum key distribution protocols over unital channels
- Cryptanalysis and improvement of multiparty quantum secret sharing schemes
- Quantum entanglement
- Symmetric extendibility for qudits and tolerable error rates in quantum cryptography
- One-party quantum-error-correcting codes for unbalanced errors: principles and application to quantum dense coding and quantum secure direct communication
- Quantum key agreement protocols with single photon in both polarization and spatial-mode degrees of freedom
- An efficient quantum secret sharing scheme with Einstein-Podolsky-Rosen pairs
- Quantum cryptography
- A proof of the security of quantum key distribution (extended abstract)
- A generic quantum protocol for one-sided secure two-party classical computations
- NOISE TOLERANCE OF THE BB84 PROTOCOL WITH RANDOM PRIVACY AMPLIFICATION
- Quantum private comparison over noisy channels
- De Finetti theorems for quantum conditional probability distributions with symmetry
- One-time pads cannot be used to improve the efficiency of quantum communication
- SECURITY OF QUANTUM KEY DISTRIBUTION
This page was built for publication: Proof of security of quantum key distribution with two-way classical communications
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4679922)