Quantum Key Distribution Without Sifting

نویسندگان

  • Alasdair B. Price
  • John G. Rarity
  • Christopher Erven
چکیده

We propose a novel quantum key distribution protocol that uses AES to expand an initial secret, allowing us to individually authenticate every qubit, with tags that are efficient to construct. In exchange for an increase in the amount of classical data to be transmitted, the tags can be handled such that they allow secure key generation from two photon states, and make BB84 exactly 100% efficient. This can be implemented as part of a software patch on pre-existing devices as no hardware modification is required. The scheme is secure so long as AES cannot be broken, therefore it is ideal for real-world implementations that use encryption schemes other than the one-time pad. Background and Motivation Assuming it is implemented perfectly, BB84 [1] is an unconditionally secure way of distributing cryptographic keys. It is of particular value for schemes that themselves offer unconditional security, such as the one time pad, but which have no intrinsic method for generating a shared secret. However, for day-to-day real-world communications, BB84-with-one-time-pad is not fast enough to be useful, so the quantum key distribution is better supplying keys to practically computationally secure applications, such as AES-256 GCM instead. In this case, BB84 still surpasses modern cryptographic alternatives, as it offers eavesdropper detection, and is secure against quantum computers. Yet a number of issues remain. Half of the qubits transmitted from Alice to Bob are discarded during sifting, rendering BB84 only 50% efficient, and photon number splitting (PNS) attacks exploit the use of weak coherent pulses in place of a single photon source. In this more realistic system, AES GCM is now the weakest link with regards to mathematical attacks (although it is still strong in absolute terms), so we ask whether a reduction in the theoretical security of BB84 can be leveraged to counter the issues above? In addition, can this new protocol be constructed in such a way that it is vulnerable only to mathematical attacks that would break the data encryption scheme, thus giving no additional benefit to attackers who target the key generation? PNS resistance and (asymptotic) efficiency improvements are already provided by the decoy state [2] and biased basis [3] protocols respectively, both by modifying the quantum hardware. Therefore, our protocol must not require any physical changes be made to the BB84 setup. SARG04 [4] helps mitigate against PNS attacks without making hardware changes, so our protocol must overall be better than this. 1 ar X iv :1 70 7. 03 33 1v 1 [ qu an tph ] 1 1 Ju l 2 01 7

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Photon-Number-Splitting-attack resistant Quantum Key Distribution Protocols without sifting

HAL is a multi-disciplinary open access archive for the deposit and dissemination of scientific research documents, whether they are published or not. The documents may come from teaching and research institutions in France or abroad, or from public or private research centers. L’archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau...

متن کامل

Custom Hardware to Eliminate Bottlenecks in QKD Throughput Performance

The National Institute of Standards and Technology (NIST) high-speed quantum key distribution (QKD) system was designed to include custom hardware to support the generation and management of gigabit data streams. As our photonics improved our software sifting algorithm couldn’t keep up with the amount of data generated. To eliminate this problem we implemented the sifting algorithm into our pro...

متن کامل

Post-processing procedure for industrial quantum key distribution systems

We present algorithmic solutions aimed on post-processing for industrial quantum key distribution systems with hardware sifting. The main steps of the procedure are error correction, parameter estimation, and privacy amplification. Authentication of a classical public communication channel is also considered.

متن کامل

High Speed Fiber-Based Quantum Key Distribution using Polarization Encoding

We have implemented a quantum key distribution (QKD) system with polarization encoding at 850 nm over 1 km of optical fiber. The high-speed management of the bit-stream, generation of random numbers and processing of the sifting algorithm are all handled by a pair of custom data handling circuit boards. As a complete system using a clock rate of 1.25 Gbit/s, it produces sifted keys at a rate of...

متن کامل

Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations.

We introduce a new class of quantum key distribution protocols, tailored to be robust against photon number splitting (PNS) attacks. We study one of these protocols, which differs from the original protocol by Bennett and Brassard (BB84) only in the classical sifting procedure. This protocol is provably better than BB84 against PNS attacks at zero error.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/1707.03331  شماره 

صفحات  -

تاریخ انتشار 2017