Information-theoretic security proof for quantum-key-distribution protocols
Top Cited Papers
- 25 July 2005
- journal article
- research article
- Published by American Physical Society (APS) in Physical Review A
- Vol. 72 (1) , 012332
- https://doi.org/10.1103/physreva.72.012332
Abstract
We present a technique for proving the security of quantum-key-distribution (QKD) protocols. It is based on direct information-theoretic arguments and thus also applies if no equivalent entanglement purification scheme can be found. Using this technique, we investigate a general class of QKD protocols with one-way classical post-processing. We show that, in order to analyze the full security of these protocols, it suffices to consider collective attacks. Indeed, we give new lower and upper bounds on the secret-key rate which only involve entropies of two-qubit density operators and which are thus easy to compute. As an illustration of our results, we analyze the Bennett-Brassard 1984, the six-state, and the Bennett 1992 protocols with one-way error correction and privacy amplification. Surprisingly, the performance of these protocols is increased if one of the parties adds noise to the measurement data before the error correction. In particular, this additional noise makes the protocols more robust against noise in the quantum channel.Keywords
All Related Versions
This publication has 18 references indexed in Scilit:
- Unconditionally Secure Key Distribution Based on Two Nonorthogonal StatesPhysical Review Letters, 2003
- Proof of security of quantum key distribution with two-way classical communicationsIEEE Transactions on Information Theory, 2003
- Security of Quantum Key Distribution against All Collective AttacksAlgorithmica, 2002
- Quantum cryptographyReviews of Modern Physics, 2002
- Simple Proof of Security of the BB84 Quantum Key Distribution ProtocolPhysical Review Letters, 2000
- Incoherent and coherent eavesdropping in the six-state protocol of quantum cryptographyPhysical Review A, 1999
- Optimal Eavesdropping in Quantum Cryptography with Six StatesPhysical Review Letters, 1998
- Bounds on Information and the Security of Quantum CryptographyPhysical Review Letters, 1997
- Security of Quantum Cryptography against Collective AttacksPhysical Review Letters, 1997
- Quantum cryptography using any two nonorthogonal statesPhysical Review Letters, 1992