A Proof of the Security of Quantum Key Distribution

We prove the security of theoretical quantum key distribution against the most general attacks which can be performed on the channel, by an eavesdropper who has unlimited computation abilities, and the full power allowed by the rules of classical and quantum physics. A key created that way can then be used to transmit secure messages such that their security is also unaffected in the future.

[1]  Lo,et al.  Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.

[2]  Barry C. Sanders,et al.  Security Aspects of Practical Quantum Cryptography , 2000, EUROCRYPT.

[3]  Jeroen van de Graaf,et al.  Security of Quantum Key Distribution against All Collective Attacks , 2002, Algorithmica.

[4]  Peter W. Shor,et al.  Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..

[5]  F. MacWilliams,et al.  The Theory of Error-Correcting Codes , 1977 .

[6]  W. Hoeffding Probability Inequalities for sums of Bounded Random Variables , 1963 .

[7]  Bennett,et al.  Parity bit in quantum cryptography. , 1996, Physical review. A, Atomic, molecular, and optical physics.

[8]  Kevin Barraclough,et al.  I and i , 2001, BMJ : British Medical Journal.

[9]  I. Chuang,et al.  Quantum Computation and Quantum Information: Bibliography , 2010 .

[10]  Sanders,et al.  Limitations on practical quantum cryptography , 2000, Physical review letters.

[11]  Ueli Maurer,et al.  Generalized privacy amplification , 1994, Proceedings of 1994 IEEE International Symposium on Information Theory.

[12]  Tal Mor Quantum memory in quantum cryptography , 1999 .

[13]  Stephen Wiesner,et al.  Conjugate coding , 1983, SIGA.

[14]  Gilles Brassard,et al.  Secret-Key Reconciliation by Public Discussion , 1994, EUROCRYPT.

[15]  E. Biham,et al.  Security of Quantum Cryptography against Collective Attacks , 1996, quant-ph/9605007.

[16]  Dominic Mayers,et al.  Unconditional security in quantum cryptography , 1998, JACM.

[17]  Patrick Billingsley,et al.  Probability and Measure. , 1986 .

[18]  E. Biahm,et al.  Bounds on Information and the Security of Quantum Cryptography , 1996 .

[19]  Dominic Mayers,et al.  On the Security of the Quantum Oblivious Transfer and Key Distribution Protocols , 1995, CRYPTO.

[20]  Hoi-Kwong Lo,et al.  A simple proof of the unconditional security of quantum key distribution , 1999, ArXiv.

[21]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[22]  N. Gisin,et al.  Optimal Eavesdropping in Quantum Cryptography. I , 1997, quant-ph/9701039.

[23]  Andrew Chi-Chih Yao,et al.  Security of quantum protocols against coherent measurements , 1995, STOC '95.

[24]  László Györfi,et al.  A Probabilistic Theory of Pattern Recognition , 1996, Stochastic Modelling and Applied Probability.

[25]  Gilles Brassard,et al.  Experimental Quantum Cryptography , 1990, EUROCRYPT.

[26]  MayersDominic Unconditional security in quantum cryptography , 2001 .

[27]  Jozef Gruska,et al.  Quantum Computing , 2008, Wiley Encyclopedia of Computer Science and Engineering.

[28]  T. Mor Reducing Quantum Errors and Improving Large Scale Quantum Cryptography , 1996 .

[29]  E. B. Davies,et al.  Information and quantum measurement , 1978, IEEE Trans. Inf. Theory.

[30]  Wolfgang Tittel,et al.  Practical Aspects of Quantum Cryptographic Key Distribution , 2000, Journal of Cryptology.

[31]  Barry C. Sanders,et al.  Quantum cryptography via parametric downconversion , 2002 .

[32]  P. Oscar Boykin,et al.  A Proof of the Security of Quantum Key Distribution , 1999, Symposium on the Theory of Computing.

[33]  Shor,et al.  Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.

[34]  Jeroen van de Graaf,et al.  Cryptographic Distinguishability Measures for Quantum-Mechanical States , 1997, IEEE Trans. Inf. Theory.

[35]  N. Gisin,et al.  OPTIMAL EAVESDROPPING IN QUANTUM CRYPTOGRAPHY. I. INFORMATION BOUND AND OPTIMAL STRATEGY , 1997 .

[36]  L. Ballentine,et al.  Quantum Theory: Concepts and Methods , 1994 .

[37]  Aaas News,et al.  Book Reviews , 1893, Buffalo Medical and Surgical Journal.

[38]  P. Billingsley,et al.  Probability and Measure , 1980 .

[39]  Deutsch,et al.  Quantum Privacy Amplification and the Security of Quantum Cryptography over Noisy Channels. , 1996, Physical review letters.

[40]  Dominic Mayers,et al.  Quantum Key Distribution and String Oblivious Transfer in Noisy Channels , 1996, CRYPTO.

[41]  Robert G. Gallager,et al.  Low-density parity-check codes , 1962, IRE Trans. Inf. Theory.