38,924 research outputs found
A simple proof of the unconditional security of quantum key distribution
Quantum key distribution is the most well-known application of quantum
cryptography. Previous proposed proofs of security of quantum key distribution
contain various technical subtleties. Here, a conceptually simpler proof of
security of quantum key distribution is presented. The new insight is the
invariance of the error rate of a teleportation channel: We show that the error
rate of a teleportation channel is independent of the signals being
transmitted. This is because the non-trivial error patterns are permuted under
teleportation. This new insight is combined with the recently proposed quantum
to classical reduction theorem. Our result shows that assuming that Alice and
Bob have fault-tolerant quantum computers, quantum key distribution can be made
unconditionally secure over arbitrarily long distances even against the most
general type of eavesdropping attacks and in the presence of all types of
noises.Comment: 13 pages, extended abstract. Comments will be appreciate
Universally-composable privacy amplification from causality constraints
We consider schemes for secret key distribution which use as a resource
correlations that violate Bell inequalities. We provide the first security
proof for such schemes, according to the strongest notion of security, the so
called universally-composable security. Our security proof does not rely on the
validity of quantum mechanics, it solely relies on the impossibility of
arbitrarily-fast signaling between separate physical systems. This allows for
secret communication in situations where the participants distrust their
quantum devices.Comment: 4 page
Device-independent quantum key distribution secure against collective attacks
Device-independent quantum key distribution (DIQKD) represents a relaxation
of the security assumptions made in usual quantum key distribution (QKD). As in
usual QKD, the security of DIQKD follows from the laws of quantum physics, but
contrary to usual QKD, it does not rely on any assumptions about the internal
working of the quantum devices used in the protocol. We present here in detail
the security proof for a DIQKD protocol introduced in [Phys. Rev. Lett. 98,
230501 (2008)]. This proof exploits the full structure of quantum theory (as
opposed to other proofs that exploit the no-signalling principle only), but
only holds again collective attacks, where the eavesdropper is assumed to act
on the quantum systems of the honest parties independently and identically at
each round of the protocol (although she can act coherently on her systems at
any time). The security of any DIQKD protocol necessarily relies on the
violation of a Bell inequality. We discuss the issue of loopholes in Bell
experiments in this context.Comment: 25 pages, 3 figure
Security of differential phase shift quantum key distribution against individual attacks
We derive a proof of security for the Differential Phase Shift Quantum Key
Distribution (DPSQKD) protocol under the assumption that Eve is restricted to
individual attacks. The security proof is derived by bounding the average
collision probability, which leads directly to a bound on Eve's mutual
information on the final key. The security proof applies to realistic sources
based on pulsed coherent light. We then compare individual attacks to
sequential attacks and show that individual attacks are more powerful
Simple Proof of Security of the BB84 Quantum Key Distribution Protocol
We prove the security of the 1984 protocol of Bennett and Brassard (BB84) for
quantum key distribution. We first give a key distribution protocol based on
entanglement purification, which can be proven secure using methods from Lo and
Chau's proof of security for a similar protocol. We then show that the security
of this protocol implies the security of BB84. The entanglement-purification
based protocol uses Calderbank-Shor-Steane (CSS) codes, and properties of these
codes are used to remove the use of quantum computation from the Lo-Chau
protocol.Comment: 5 pages, Latex, minor changes to improve clarity and fix typo
- …