1,692 research outputs found
Using quantum key distribution for cryptographic purposes: a survey
The appealing feature of quantum key distribution (QKD), from a cryptographic
viewpoint, is the ability to prove the information-theoretic security (ITS) of
the established keys. As a key establishment primitive, QKD however does not
provide a standalone security service in its own: the secret keys established
by QKD are in general then used by a subsequent cryptographic applications for
which the requirements, the context of use and the security properties can
vary. It is therefore important, in the perspective of integrating QKD in
security infrastructures, to analyze how QKD can be combined with other
cryptographic primitives. The purpose of this survey article, which is mostly
centered on European research results, is to contribute to such an analysis. We
first review and compare the properties of the existing key establishment
techniques, QKD being one of them. We then study more specifically two generic
scenarios related to the practical use of QKD in cryptographic infrastructures:
1) using QKD as a key renewal technique for a symmetric cipher over a
point-to-point link; 2) using QKD in a network containing many users with the
objective of offering any-to-any key establishment service. We discuss the
constraints as well as the potential interest of using QKD in these contexts.
We finally give an overview of challenges relative to the development of QKD
technology that also constitute potential avenues for cryptographic research.Comment: Revised version of the SECOQC White Paper. Published in the special
issue on QKD of TCS, Theoretical Computer Science (2014), pp. 62-8
Tight Finite-Key Analysis for Quantum Cryptography
Despite enormous progress both in theoretical and experimental quantum
cryptography, the security of most current implementations of quantum key
distribution is still not established rigorously. One of the main problems is
that the security of the final key is highly dependent on the number, M, of
signals exchanged between the legitimate parties. While, in any practical
implementation, M is limited by the available resources, existing security
proofs are often only valid asymptotically for unrealistically large values of
M. Here, we demonstrate that this gap between theory and practice can be
overcome using a recently developed proof technique based on the uncertainty
relation for smooth entropies. Specifically, we consider a family of
Bennett-Brassard 1984 quantum key distribution protocols and show that security
against general attacks can be guaranteed already for moderate values of M.Comment: 11 pages, 2 figure
Noiseless Linear Amplifiers in Entanglement-Based Continuous-Variable Quantum Key Distribution
We propose a method to improve the performance of two entanglement-based
continuous-variable quantum key distribution protocols using noiseless linear
amplifiers. The two entanglement-based schemes consist of an entanglement
distribution protocol with an untrusted source and an entanglement swapping
protocol with an untrusted relay. Simulation results show that the noiseless
linear amplifiers can improve the performance of these two protocols, in terms
of maximal transmission distances, when we consider small amounts of
entanglement, as typical in realistic setups.Comment: Special issue on Quantum Cryptograph
Distributing Secret Keys with Quantum Continuous Variables: Principle, Security and Implementations
The ability to distribute secret keys between two parties with
information-theoretic security, that is, regardless of the capacities of a
malevolent eavesdropper, is one of the most celebrated results in the field of
quantum information processing and communication. Indeed, quantum key
distribution illustrates the power of encoding information on the quantum
properties of light and has far reaching implications in high-security
applications. Today, quantum key distribution systems operate in real-world
conditions and are commercially available. As with most quantum information
protocols, quantum key distribution was first designed for qubits, the
individual quanta of information. However, the use of quantum continuous
variables for this task presents important advantages with respect to qubit
based protocols, in particular from a practical point of view, since it allows
for simple implementations that require only standard telecommunication
technology. In this review article, we describe the principle of
continuous-variable quantum key distribution, focusing in particular on
protocols based on coherent states. We discuss the security of these protocols
and report on the state-of-the-art in experimental implementations, including
the issue of side-channel attacks. We conclude with promising perspectives in
this research field.Comment: 21 pages, 2 figures, 1 tabl
The Uncertainty Principle in the Presence of Quantum Memory
The uncertainty principle, originally formulated by Heisenberg, dramatically
illustrates the difference between classical and quantum mechanics. The
principle bounds the uncertainties about the outcomes of two incompatible
measurements, such as position and momentum, on a particle. It implies that one
cannot predict the outcomes for both possible choices of measurement to
arbitrary precision, even if information about the preparation of the particle
is available in a classical memory. However, if the particle is prepared
entangled with a quantum memory, a device which is likely to soon be available,
it is possible to predict the outcomes for both measurement choices precisely.
In this work we strengthen the uncertainty principle to incorporate this case,
providing a lower bound on the uncertainties which depends on the amount of
entanglement between the particle and the quantum memory. We detail the
application of our result to witnessing entanglement and to quantum key
distribution.Comment: 5 pages plus 12 of supplementary information. Updated to match the
journal versio
- …