Security of Quantum Key Distribution against All Collective Attacks

Abstract. Security of quantum key distribution against sophisticated attacks is among the most important issues in quantum information theory. In this work we prove security against a very important class of attacks called collective attacks (under a compatible noise model) which use quantum memories and gates, and which are directed against the final key. This work was crucial for a full proof of security (against the joint attack) recently obtained by Biham, Boyer, Boykin, Mor, and Roychowdhury [1].

[1]  C. E. SHANNON,et al.  A mathematical theory of communication , 1948, MOCO.

[2]  W. Hoeffding Probability Inequalities for sums of Bounded Random Variables , 1963 .

[3]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[4]  Stephen Wiesner,et al.  Conjugate coding , 1983, SIGA.

[5]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.

[6]  Charles H. Bennett,et al.  Quantum cryptography using any two nonorthogonal states. , 1992, Physical review letters.

[7]  L. Ballentine,et al.  Quantum Theory: Concepts and Methods , 1994 .

[8]  N. Fisher,et al.  Probability Inequalities for Sums of Bounded Random Variables , 1994 .

[9]  Bennett,et al.  Parity bit in quantum cryptography. , 1996, Physical review. A, Atomic, molecular, and optical physics.

[10]  Lov K. Grover A fast quantum mechanical algorithm for database search , 1996, STOC '96.

[11]  Dominic Mayers,et al.  Quantum Key Distribution and String Oblivious Transfer in Noisy Channels , 1996, CRYPTO.

[12]  C. Fuchs Distinguishability and Accessible Information in Quantum Theory , 1996, quant-ph/9601020.

[13]  E. Biahm,et al.  Bounds on Information and the Security of Quantum Cryptography , 1996 .

[14]  N. Gisin,et al.  Quantum cryptography , 1998 .

[15]  E. Biham,et al.  Security of Quantum Cryptography against Collective Attacks , 1996, quant-ph/9605007.

[16]  Jeroen van de Graaf,et al.  Towards a formal definition of security for quantum protocols , 1998 .

[17]  Lo,et al.  Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.

[18]  Peter W. Shor,et al.  Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..

[19]  Jeroen van de Graaf,et al.  Cryptographic Distinguishability Measures for Quantum-Mechanical States , 1997, IEEE Trans. Inf. Theory.

[20]  P. Oscar Boykin,et al.  A Proof of the Security of Quantum Key Distribution , 1999, STOC '00.

[21]  Shor,et al.  Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.

[22]  Sanders,et al.  Limitations on practical quantum cryptography , 2000, Physical review letters.

[23]  Dominic Mayers,et al.  Unconditional security in quantum cryptography , 1998, JACM.