File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Article: Proof of security of quantum key distribution with two-way classical communications

TitleProof of security of quantum key distribution with two-way classical communications
Authors
KeywordsQuantum information
Cryptography
Key distribution
Quantum cryptography
Quantum information processing
Issue Date2003
Citation
IEEE Transactions on Information Theory, 2003, v. 49, n. 2, p. 457-475 How to Cite?
AbstractShor and Preskill have provided a simple proof of security of the standard quantum key distribution scheme by Bennett and Brassard (BBS4) by demonstrating a connection between key distribution and entanglement purification protocols (EPPs) with one-way communications. Here, we provide proofs of security of standard quantum key distribution schemes, BB84 and the six-state scheme, against the most general attack, by using the techniques of two-way entanglement purification. We demonstrate clearly the advantage of classical post-processing with two-way classical communications over classical post-processing with only one-way classical communications in quantum key distribution (QKD). This is done by the explicit construction of a new protocol for (the error correction/detection and privacy amplification of) BB84 that can tolerate a bit error rate of up to 18.9%, which is higher than what any BB84 scheme with only one-way classical communications can possibly tolerate. Moreover, we demonstrate the advantage of the six-state scheme over BBS4 by showing that the six-state scheme can strictly tolerate a higher bit error rate than BB84. In particular, our six-state protocol can tolerate a bit error rate of 26.4 %, which is higher than the upper bound of 25 % bit error rate for any secure BB84 protocol. Consequently, our protocols may allow higher key generation rate and remain secure over longer distances than previous protocols. Our investigation suggests that two-way entanglement purification is a useful tool in the study of advantage distillation, error correction, and privacy amplification protocols.
Persistent Identifierhttp://hdl.handle.net/10722/285569
ISSN
2023 Impact Factor: 2.2
2023 SCImago Journal Rankings: 1.607
ISI Accession Number ID

 

DC FieldValueLanguage
dc.contributor.authorGottesman, Daniel-
dc.contributor.authorLo, Hoi Kwong-
dc.date.accessioned2020-08-18T04:56:05Z-
dc.date.available2020-08-18T04:56:05Z-
dc.date.issued2003-
dc.identifier.citationIEEE Transactions on Information Theory, 2003, v. 49, n. 2, p. 457-475-
dc.identifier.issn0018-9448-
dc.identifier.urihttp://hdl.handle.net/10722/285569-
dc.description.abstractShor and Preskill have provided a simple proof of security of the standard quantum key distribution scheme by Bennett and Brassard (BBS4) by demonstrating a connection between key distribution and entanglement purification protocols (EPPs) with one-way communications. Here, we provide proofs of security of standard quantum key distribution schemes, BB84 and the six-state scheme, against the most general attack, by using the techniques of two-way entanglement purification. We demonstrate clearly the advantage of classical post-processing with two-way classical communications over classical post-processing with only one-way classical communications in quantum key distribution (QKD). This is done by the explicit construction of a new protocol for (the error correction/detection and privacy amplification of) BB84 that can tolerate a bit error rate of up to 18.9%, which is higher than what any BB84 scheme with only one-way classical communications can possibly tolerate. Moreover, we demonstrate the advantage of the six-state scheme over BBS4 by showing that the six-state scheme can strictly tolerate a higher bit error rate than BB84. In particular, our six-state protocol can tolerate a bit error rate of 26.4 %, which is higher than the upper bound of 25 % bit error rate for any secure BB84 protocol. Consequently, our protocols may allow higher key generation rate and remain secure over longer distances than previous protocols. Our investigation suggests that two-way entanglement purification is a useful tool in the study of advantage distillation, error correction, and privacy amplification protocols.-
dc.languageeng-
dc.relation.ispartofIEEE Transactions on Information Theory-
dc.subjectQuantum information-
dc.subjectCryptography-
dc.subjectKey distribution-
dc.subjectQuantum cryptography-
dc.subjectQuantum information processing-
dc.titleProof of security of quantum key distribution with two-way classical communications-
dc.typeArticle-
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.doi10.1109/TIT.2002.807289-
dc.identifier.scopuseid_2-s2.0-0037319628-
dc.identifier.volume49-
dc.identifier.issue2-
dc.identifier.spage457-
dc.identifier.epage475-
dc.identifier.isiWOS:000181265500009-
dc.identifier.issnl0018-9448-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats