Editing Quantum Key Distribution
Jump to navigation
Jump to search
The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 6: | Line 6: | ||
[[Category: Two Party Protocols]] [[Category: Quantum Enhanced Classical Functionality]] [[Category:Specific Task]] | [[Category: Two Party Protocols]] [[Category: Quantum Enhanced Classical Functionality]] [[Category:Specific Task]] | ||
== Use | == Use Cases == | ||
* QKD can replace Diffie-Hellman key agreement protocols. For example in TLS, SSL, IPsec, etc. | * QKD can replace Diffie-Hellman key agreement protocols. For example in TLS, SSL, IPsec, etc. | ||
* If secure key rate is sufficiently high, one can use QKD to generate a secure key that will be used for information theoretically secure authenticated encryption scheme, e.g. using one-time pad together with an authentication scheme like those presented in [[Quantum Key Distribution #References|[1] ]]. | * If secure key rate is sufficiently high, one can use QKD to generate a secure key that will be used for information theoretically secure authenticated encryption scheme, e.g. using one-time pad together with an authentication scheme like those presented in [[Quantum Key Distribution #References|[1] ]]. | ||
==Protocols== | ==Protocols== | ||
*[[BB84 Quantum Key Distribution]]: [[:Category: Prepare and Measure Network Stage|Prepare and Measure Network Stage]] | *[[BB84 Quantum Key Distribution]]: [[:Category: Prepare and Measure Network Stage|Prepare and Measure Network Stage]] | ||
*[[Device Independent Quantum Key Distribution]]:[[:Category:Entanglement Distribution Network stage| Entanglement Distribution Network Stage]] | *[[Device Independent Quantum Key Distribution]]:[[:Category:Entanglement Distribution Network stage|Entanglement Distribution Network Stage]] | ||
Device-Independent Quantum Key Distribution (DI-QKD) | Device-Independent Quantum Key Distribution (DI-QKD) has better security guarantees than BB84 QKD. | ||
[[Category: Prepare and Measure Network Stage]] [[Category:Entanglement Distribution Network stage]] | [[Category: Prepare and Measure Network Stage]] [[Category:Entanglement Distribution Network stage]] | ||
==Properties== | ==Properties== | ||
A quantum key distribution protocol is secure if it is ''correct'' and ''secret''. Correctness is the statement that Alice and Bob share the same string of bits, namely the secret key, at the end of the protocol. Secrecy is the statement that the eavesdropper is | A quantum key distribution protocol is secure if it is ''correct'' and ''secret''. Correctness is the statement that Alice and Bob share the same string of bits, namely the secret key, at the end of the protocol. Secrecy is the statement that the eavesdropper is totally ignorant about the final key. | ||
*'''Correctness''' A QKD protocol is <math>\epsilon_{\rm corr}</math>-correct if the probability that the final key of Alice differs from the final key of Bob, is smaller than <math>\epsilon_{\rm corr}</math> | *'''Correctness''' A QKD protocol is <math>\epsilon_{\rm corr}</math>-correct if the probability that the final key of Alice differs from the final key of Bob, is smaller than <math>\epsilon_{\rm corr}</math> | ||
Line 33: | Line 30: | ||
==Further Information== | ==Further Information== | ||
The security definition presented here, are proven to be sufficient to guarantee universal composability for standard QKD in [[Quantum Key Distribution #References|[2] ]]. For device-independent quantum key distribution, attacks presented in [[Quantum Key Distribution #References|[3] ]] show that security can be compromised if the same devices are used to implement another instance of the protocol. | The security definition presented here, are proven to be sufficient to guarantee universal composability for standard QKD in [[Quantum Key Distribution #References|[2] ]]. For device-independent quantum key distribution, attacks presented in [[Quantum Key Distribution #References|[3] ]] show that security can be compromised if the same devices are used to implement another instance of the protocol. | ||
==References== | ==References== |