Quantum Key Distribution: Difference between revisions
No edit summary |
No edit summary |
||
Line 1: | Line 1: | ||
==Functionality Description== | ==Functionality Description== | ||
Quantum key distribution is a task that enables two parties, | Quantum key distribution is a task that enables two parties, Sender and Receiver, to establish a classical secret key by using quantum systems. A classical secret key is a random string of bits known to only Sender and Receiver, and completely unknown to any third party, namely an eavesdropper. Such a secret key can for example be used to encrypt a classical message sent over a public channel. | ||
'''Tags:''' [[:Category: Two Party Protocols|Two Party]], [[:Category: Quantum Enhanced Classical Functionality|Quantum Enhanced Classical Functionality]], [[:Category: Specific Task|Specific Task]], unconditional security (information theoretical security), random number generator, key generation, secret key | '''Tags:''' [[:Category: Two Party Protocols|Two Party]], [[:Category: Quantum Enhanced Classical Functionality|Quantum Enhanced Classical Functionality]], [[:Category: Specific Task|Specific Task]], unconditional security (information theoretical security), random number generator, key generation, secret key | ||
Line 13: | Line 13: | ||
[[Category: Prepare and Measure Network Stage]] [[Category:Entanglement Distribution Network stage]] | [[Category: Prepare and Measure Network Stage]] [[Category:Entanglement Distribution Network stage]] | ||
==Properties== | ==Properties== | ||
A quantum key distribution protocol is secure if it is ''correct'' and ''secret''. Correctness is the statement that | A quantum key distribution protocol is secure if it is ''correct'' and ''secret''. Correctness is the statement that Sender and Receiver share the same string of bits, namely the secret key, at the end of the protocol. Secrecy is the statement that the eavesdropper is totally ignorant about the final key. | ||
*'''Correctness''' A QKD protocol is <math>\epsilon_{\rm corr}</math>-correct if the probability that the final key of | *'''Correctness''' A QKD protocol is <math>\epsilon_{\rm corr}</math>-correct if the probability that the final key of Sender differs from the final key of Receiver, is smaller than <math>\epsilon_{\rm corr}</math> | ||
*'''Secrecy''' A QKD protocol is <math>\epsilon_{\rm sec}</math>-secret if for every input state it holds that | *'''Secrecy''' A QKD protocol is <math>\epsilon_{\rm sec}</math>-secret if for every input state it holds that |
Revision as of 13:58, 19 March 2019
Functionality Description
Quantum key distribution is a task that enables two parties, Sender and Receiver, to establish a classical secret key by using quantum systems. A classical secret key is a random string of bits known to only Sender and Receiver, and completely unknown to any third party, namely an eavesdropper. Such a secret key can for example be used to encrypt a classical message sent over a public channel.
Tags: Two Party, Quantum Enhanced Classical Functionality, Specific Task, unconditional security (information theoretical security), random number generator, key generation, secret key
Protocols
- BB84 Quantum Key Distribution: Prepare and Measure Network Stage
- Device-Independent Quantum Key Distribution:Entanglement Distribution Network Stage
Device-Independent Quantum Key Distribution (DI-QKD) has better security guarantees than BB84 QKD.
Properties
A quantum key distribution protocol is secure if it is correct and secret. Correctness is the statement that Sender and Receiver share the same string of bits, namely the secret key, at the end of the protocol. Secrecy is the statement that the eavesdropper is totally ignorant about the final key.
- Correctness A QKD protocol is -correct if the probability that the final key of Sender differs from the final key of Receiver, is smaller than
- Secrecy A QKD protocol is -secret if for every input state it holds that
Failed to parse (SVG (MathML can be enabled via browser plugin): Invalid response ("Math extension cannot connect to Restbase.") from server "https://wikimedia.org/api/rest_v1/":): {\displaystyle \frac{1}{2}{\|{\rho_{K_AE}}-{\tau_{K_A}\otimes \rho_E}\|}_1\leq \epsilon_{\rm sec},} where is the maximally mixed state in the space of strings , and is the trace norm.
- A protocol implements a -QKD if with rounds it generates an -correct and -secret key of size Failed to parse (SVG (MathML can be enabled via browser plugin): Invalid response ("Math extension cannot connect to Restbase.") from server "https://wikimedia.org/api/rest_v1/":): {\displaystyle \ell} bits.
Further Information
The security definition presented here, are proven to be sufficient to guarantee universal composability for standard QKD in (2). For device-independent quantum key distribution, attacks presented in (1) show that security can be compromised if the same devices are used to implement another instance of the protocol.
- PR (2014) discusses security of various QKD schemes composed in other cryptographic protocols.
- BCK (2013) Analyses device independent QKD