Quantum Key Distribution Protocols

The goal of any quantum key distribution (QKD) protocol is to generate a shared secret key between two distant parties over a public communication channel. The crucial point here is that the key generating protocol is provably secure against any possible attack that an eavesdropper can perform. It is the law of physics (or, in fact, quantum mechanics) that guarantees the security of the protocol, not only the technical limitations that exist in practical implementations. Therefore, one can be sure that the protocol will be secure until eternity, and not only until someone invents a crazily powerful decryption machine (or, to be precise, the protocol will be secure as long as quantum mechanics is not disproved). In general, a quantum key distribution protocol can be divided into two parts: The first part is the quantum transmission phase, in which Alice and Bob send and/or measure quantum states. The second part is the classical post-processing phase, where they turn the bit strings generated in the quantum phase into a pair of secure keys.

[1]  Renato Renner,et al.  Security of quantum key distribution , 2005, Ausgezeichnete Informatikdissertationen.

[2]  H. Bechmann-Pasquinucci,et al.  Quantum cryptography , 2001, quant-ph/0101098.

[3]  V. Scarani,et al.  Security of two quantum cryptography protocols using the same four qubit states (18 pages) , 2005, quant-ph/0505035.

[4]  Lo,et al.  Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.

[5]  Richard W. Hamming,et al.  Coding and Information Theory , 1980 .

[6]  Robert König,et al.  The Operational Meaning of Min- and Max-Entropy , 2008, IEEE Transactions on Information Theory.

[7]  Norbert Lütkenhaus,et al.  Entanglement as a precondition for secure quantum key distribution. , 2004, Physical review letters.

[8]  R. Serfling Probability Inequalities for the Sum in Sampling without Replacement , 1974 .

[9]  Larry Carter,et al.  New Hash Functions and Their Use in Authentication and Set Equality , 1981, J. Comput. Syst. Sci..

[10]  F. MacWilliams,et al.  The Theory of Error-Correcting Codes , 1977 .

[11]  Normand J. Beaudry Assumptions in quantum cryptography , 2015, 1505.02792.

[12]  I. Chuang,et al.  Quantum Computation and Quantum Information: Bibliography , 2010 .

[13]  A. Shimony,et al.  Proposed Experiment to Test Local Hidden Variable Theories. , 1969 .

[14]  J. S. Shaari,et al.  Advances in Quantum Cryptography , 2019, 1906.01645.

[15]  B. S. Cirel'son Quantum generalizations of Bell's inequality , 1980 .

[16]  W. Hoeffding Probability Inequalities for sums of Bounded Random Variables , 1963 .

[17]  Anindya De,et al.  Trevisan's Extractor in the Presence of Quantum Side Information , 2009, SIAM J. Comput..

[18]  Larry Carter,et al.  Universal Classes of Hash Functions , 1979, J. Comput. Syst. Sci..

[19]  Robert König,et al.  Universally Composable Privacy Amplification Against Quantum Adversaries , 2004, TCC.

[20]  H. Bechmann-Pasquinucci,et al.  Incoherent and coherent eavesdropping in the six-state protocol of quantum cryptography , 1998, quant-ph/9807041.

[21]  Charles H. Bennett,et al.  Quantum cryptography using any two nonorthogonal states. , 1992, Physical review letters.

[22]  Robert König,et al.  Sampling of Min-Entropy Relative to Quantum Knowledge , 2007, IEEE Transactions on Information Theory.

[23]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.

[24]  H. Chernoff A Measure of Asymptotic Efficiency for Tests of a Hypothesis Based on the sum of Observations , 1952 .

[25]  D. Bruß Optimal Eavesdropping in Quantum Cryptography with Six States , 1998, quant-ph/9805019.

[26]  Nicolas Gisin,et al.  Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations. , 2004, Physical review letters.

[27]  J. Bell On the Einstein-Podolsky-Rosen paradox , 1964 .