Quantum Key Distribution: Difference between revisions

From Quantum Protocol Zoo
Jump to navigation Jump to search
No edit summary
Line 8: Line 8:
== Use Cases ==
== Use Cases ==
* Can replace Diffie-Hellman key agreement protocols. For example in TLS, SSL, IPsec, etc.
* Can replace Diffie-Hellman key agreement protocols. For example in TLS, SSL, IPsec, etc.
* If secure key rate are sufficiently high, one can use QKD for information theoretically secure authenticated encryption scheme, e.g. One-time pad together with the authentication scheme presented in [[Quantum Key Distribution #References|[1] ]].
* If secure key rate is sufficiently high, one can use QKD for information theoretically secure authenticated encryption scheme, e.g. using one-time pad together with an authentication scheme like those presented in [[Quantum Key Distribution #References|[1] ]].


==Protocols==
==Protocols==

Revision as of 10:20, 2 May 2019

Functionality Description

Quantum key distribution is a task that enables two parties, Alice and Bob, to establish a classical secret key by using quantum systems. A classical secret key is a random string of bits known to only Alice and Bob, and completely unknown to any third party, namely an eavesdropper. Such a secret key can for example be used to encrypt a classical message sent over a public channel.

Tags: Two Party, Quantum Enhanced Classical Functionality, Specific Task, unconditional security (information theoretical security), random number generator, key generation, secret key

Use Cases

  • Can replace Diffie-Hellman key agreement protocols. For example in TLS, SSL, IPsec, etc.
  • If secure key rate is sufficiently high, one can use QKD for information theoretically secure authenticated encryption scheme, e.g. using one-time pad together with an authentication scheme like those presented in [1] .

Protocols

Device-Independent Quantum Key Distribution (DI-QKD) has better security guarantees than BB84 QKD.

Properties

A quantum key distribution protocol is secure if it is correct and secret. Correctness is the statement that Alice and Bob share the same string of bits, namely the secret key, at the end of the protocol. Secrecy is the statement that the eavesdropper is totally ignorant about the final key.

  • Correctness A QKD protocol is -correct if the probability that the final key of Alice differs from the final key of Bob, is smaller than Failed to parse (SVG (MathML can be enabled via browser plugin): Invalid response ("Math extension cannot connect to Restbase.") from server "https://wikimedia.org/api/rest_v1/":): {\displaystyle \epsilon_{\rm corr}}
  • Secrecy A QKD protocol is Failed to parse (SVG (MathML can be enabled via browser plugin): Invalid response ("Math extension cannot connect to Restbase.") from server "https://wikimedia.org/api/rest_v1/":): {\displaystyle \epsilon_{\rm sec}} -secret if for every input state it holds that

where is the maximally mixed state in the space of strings , and is the trace norm.

  • A protocol implements a -QKD if with rounds it generates an -correct and -secret key of size bits.

Further Information

The security definition presented here, are proven to be sufficient to guarantee universal composability for standard QKD in [2] . For device-independent quantum key distribution, attacks presented in [3] show that security can be compromised if the same devices are used to implement another instance of the protocol.

References

  1. Codes for Interactive Authentication
  2. PR (2014) discusses security of various QKD schemes composed in other cryptographic protocols.
  3. BCK (2013) Analyses device independent QKD


contributed by Bas Dirke, Victoria Lipinska, Gláucia Murta and Jérémy Ribeiro