Security proof for round-robin differential phase shift QKD

We give a security proof of the ‘round-robin differential phase shift’ (RRDPS) quantum key distribution scheme, and we give a tight bound on the required amount of privacy amplification. Our proof consists of the following steps. We construct an EPR variant of the scheme. We show that the RRDPS protocol is equivalent to RRDPS with basis permutation and phase flips performed by Alice and Bob; this causes a symmetrization of Eve’s state. We identify Eve’s optimal way of coupling an ancilla to an EPR qudit pair under the constraint that the bit error rate between Alice and Bob should not exceed a value $$\beta $$β. As a function of $$\beta $$β, we derive, for non-asymptotic key size, the trace distance between the real state and a state in which no leakage exists. We invoke post-selection in order to go from qudit-wise attacks to general attacks. For asymptotic key size, we obtain a bound on the trace distance based on the von Neumann entropy. Our asymptotic result for the privacy amplification is sharper than existing bounds. At low qudit dimension, even our non-asymptotic result is sharper than existing asymptotic bounds.

[1]  Robert König,et al.  Universally Composable Privacy Amplification Against Quantum Adversaries , 2004, TCC.

[2]  Matthias Christandl,et al.  Postselection technique for quantum channels with applications to quantum cryptography. , 2008, Physical review letters.

[3]  A. Holevo Statistical decision theory for quantum systems , 1973 .

[4]  W. Wootters,et al.  A single quantum cannot be cloned , 1982, Nature.

[5]  R. Renner,et al.  An information-theoretic security proof for QKD protocols , 2005, quant-ph/0502064.

[6]  Aleks Kissinger,et al.  Picturing Quantum Processes , 2017 .

[7]  R. Renner,et al.  Information-theoretic security proof for quantum-key-distribution protocols , 2005, quant-ph/0502064.

[8]  Josef Pieprzyk,et al.  Round-robin-differential-phase-shift quantum key distribution based on wavelength division multiplexing , 2018, Laser Physics Letters.

[9]  Hiroki Takesue,et al.  Differential-phase-shift quantum key distribution , 2009, 2006 Digest of the LEOS Summer Topical Meetings.

[10]  T. Ralph,et al.  Continuous variable quantum cryptography , 1999, quant-ph/9907073.

[11]  M. Hillery Quantum cryptography with squeezed states , 1999, quant-ph/9909006.

[12]  John Preskill,et al.  Secure quantum key distribution using squeezed states , 2001 .

[13]  Hoi-Kwong Lo,et al.  Efficient Quantum Key Distribution Scheme and a Proof of Its Unconditional Security , 2004, Journal of Cryptology.

[14]  Masato Koashi,et al.  A security proof of the round-robin differential phase shift quantum key distribution protocol based on the signal disturbance , 2017, 1701.08509.

[15]  Shor,et al.  Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.

[16]  Christian Schaffner,et al.  Quantum cryptography beyond quantum key distribution , 2015, Designs, Codes and Cryptography.

[17]  Charles H. Bennett,et al.  Quantum cryptography using any two nonorthogonal states. , 1992, Physical review letters.

[18]  Renato Renner,et al.  Security of quantum key distribution , 2005, Ausgezeichnete Informatikdissertationen.

[19]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.

[20]  Gilles Brassard,et al.  Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..

[21]  Boris Skoric A short note on the security of Round-Robin Differential Phase-Shift QKD , 2017, IACR Cryptol. ePrint Arch..

[22]  XiaoYuan ZhenZhang,et al.  Practical round-robin differential-phase-shift quantum key distribution , 2017 .

[23]  Yoshihisa Yamamoto,et al.  Practical quantum key distribution protocol without monitoring signal disturbance , 2014, Nature.

[24]  R. Renner Symmetry of large physical systems implies independence of subsystems , 2007 .

[25]  D. Bruß Optimal Eavesdropping in Quantum Cryptography with Six States , 1998, quant-ph/9805019.

[26]  Robert König,et al.  The Operational Meaning of Min- and Max-Entropy , 2008, IEEE Transactions on Information Theory.

[27]  B Kraus,et al.  Lower and upper bounds on the secret-key rate for quantum key distribution protocols using one-way classical communication. , 2004, Physical review letters.