A Formal Approach to Unconditional Security Proofs for Quantum Key Distribution
نویسندگان
چکیده
We present an approach to automate Shor-Preskill style unconditional security proof of QKDs. In Shor-Preskill’s proof, the target QKD, BB84, is transformed into another QKD based on an entanglement distillation protocol (EDP), which is more feasible for direct analysis. We formalized heir method as program transformation in a quantum programming language, QPL. The transform is defined as rewriting rules which are sound with respect to the security in the semantics of QPL. We proved that rewriting always terminates for any program and that the normal form is unique under appropriate conditions. By applying the rewriting rules to the program representing BB84, we can obtain the corresponding EDP-based protocol automatically. We finally proved the security of the obtained EDP-based protocol formally in the quantum Hoare logic, which is a system for formal verification of quantum programs. We show also that this method can be applied to B92 by a simple modification.
منابع مشابه
A Necessary Condition for the Security of Coherent- One-Way Quantum Key Distribution Protocol
The coherent-one-way and the differential-phase-shift protocols are two of the most recent practical quantum key distribution protocols for quantum cryptography. These protocols belong to a class of so-called distributed-phase-reference quantum key distribution protocols. While security proofs for some limited attacks exist, the unconditional security proofs this class of protocol remain unreal...
متن کاملUnconditional security of quantum key distribution and the uncertainty principle
An approach to the unconditional security of quantum key distribution protocols is presented, which is based on the uncertainty principle. The approach applies to every case that has been treated via the argument by Shor and Preskill, but it is not necessary to find quantum error correcting codes. It can also treat the cases with uncharacterized apparatuses. The proof can be applied to cases wh...
متن کاملApplication of a Process Calculus to Security Proofs of Quantum Protocols
We apply a quantum process calculus to an equivalence proof of quantum key distribution protocols. Whether in classical or quantum cryptography, it is recognized that security proofs tend to be complex and difficult to verify. The use of formal methods is a way to tame such complexity. Quantum process calculi have already been used to model quite simple quantum protocols but not applied to secu...
متن کاملUnconditional security at a low cost
By simulating four quantum key distribution (QKD) experiments and analyzing one decoy-state QKD experiment, we compare two data post-processing schemes based on security against individual attack by Lütkenhaus, and unconditional security analysis by Gottesman-Lo-Lütkenhaus-Preskill. Our results show that these two schemes yield close performances. Since the Holy Grail of QKD is its unconditiona...
متن کاملThe Physical Underpinning of Security Proofs for Quantum Key Distribution
The dawn of quantum technology unveils a plethora of new possibilities and challenges in the world of information technology, one of which is the quest for secure information transmission. A breakthrough in classical algorithm or the development of a quantum computer could threaten the security of messages encoded using public key cryptosystems based on one-way function such as RSA. Quantum key...
متن کامل