Security Bounds for Quantum Cryptography with Finite Resources
From MaRDI portal
Publication:5503299
Abstract: A practical quantum key distribution (QKD) protocol necessarily runs in finite time and, hence, only a finite amount of communication is exchanged. This is in contrast to most of the standard results on the security of QKD, which only hold in the limit where the number of transmitted signals approaches infinity. Here, we analyze the security of QKD under the realistic assumption that the amount of communication is finite. At the level of the general formalism, we present new results that help simplifying the actual implementation of QKD protocols: in particular, we show that symmetrization steps, which are required by certain security proofs (e.g., proofs based on de Finetti's representation theorem), can be omitted in practical implementations. Also, we demonstrate how two-way reconciliation protocols can be taken into account in the security analysis. At the level of numerical estimates, we present the bounds with finite resources for ``device-independent security against collective attacks.
Recommendations
Cites work
- Distillation of secret key and entanglement from quantum states
- New hash functions and their use in authentication and set equality
- Proof of security of quantum key distribution with two-way classical communications
- Proposed experiment to test local hidden-variable theories
- Quantum cryptography
- Quantum cryptography based on Bell’s theorem
- SECURITY OF QUANTUM KEY DISTRIBUTION
- Theory of Cryptography
- Universal classes of hash functions
Cited in
(11)- Quantum cryptography beyond quantum key distribution
- Quantum resource estimation for FSR based symmetric ciphers and related Grover's attacks
- Asymmetric ``4+2 protocol for quantum key distribution with finite resources
- QKD: a million signal task
- Quantum cryptography: key distribution and beyond
- Criteria of key security
- Physical Limitations of Quantum Cryptographic Primitives or Optimal Bounds for Quantum Coin Flipping and Bit Commitment
- Simple and tight device-independent security proofs
- Fundamental finite key limits for one-way information reconciliation in quantum key distribution
- Key-leakage evaluation of authentication in quantum key distribution with finite resources
- De Finetti theorems for quantum conditional probability distributions with symmetry
This page was built for publication: Security Bounds for Quantum Cryptography with Finite Resources
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5503299)