On the Security of Quantum Cryptography Against Collective Attacks

نویسنده

  • Eli Biham
چکیده

We present strong attacks against quantum key distribution schemes which use quantum memories and quantum gates to attack directly the final key. We analyze a specific attack of this type, for which we find the density matrices available to the eavesdropper and the optimal information which can be extracted from them. We prove security against this attack and discuss security against any attack allowed by the rules of quantum mechanics. PACS number(s): 03.65.Bz, 89.70, 89.80 Quantum cryptography [1, 2, 3, 4, 5] uses quantum mechanics to perform new cryptographic tasks — especially information secure key distributions — which are beyond the abilities of classical cryptography. Unfortunately, the security of such a key is still unproven: Sophisticated attacks (called coherent or joint attacks) which are directed against the final key were suggested; The analysis of such attacks is very complicated, and, by the time this work was submitted, security against them was proven only in the non-realistic case of ideal (error-free) channels [6, 7]. The security in the real case, which is crucial for making quantum cryptography practical, is commonly believed but yet unproven. A proof of security must bound the information available to the eavesdropper (traditionally called Eve), on the final key, to be negligible

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Bounds on Information and the Security of Quantum Cryptography

We present new physical bounds on quantum information, and use them to prove the security of quantum cryptography against a large class of collective attacks. Such attacks are directed against the final key, and security against them suggests that quantum cryptography is ultimately secure.

متن کامل

Security of Quantum Cryptography against Collective Attacks

We present strong attacks against quantum key distribution schemes which use quantum memories and quantum gates to attack directly the final key. We analyze a specific attack of this type, for which we find the density matrices available to the eavesdropper and the optimal information which can be extracted from them. We prove security against this attack and discuss security against any attack...

متن کامل

Composable Security Against Collective Attacks of a Modified BB84 QKD Protocol with Information only in One Basis

Quantum Cryptography uses the counter-intuitive properties of Quantum Mechanics for performing cryptographic tasks in a secure and reliable way. The Quantum Key Distribution (QKD) protocol BB84 has been proven secure against several important types of attacks: collective attacks and joint attacks. Here we analyze the security of a modified BB84 protocol, for which information is sent only in th...

متن کامل

Device-independent security of quantum cryptography against collective attacks.

We present the optimal collective attack on a quantum key distribution protocol in the "device-independent" security scenario, where no assumptions are made about the way the quantum key distribution devices work or on what quantum system they operate. Our main result is a tight bound on the Holevo information between one of the authorized parties and the eavesdropper, as a function of the amou...

متن کامل

A new security proof for FMNV continuous non-malleable encoding scheme

A non-malleable code is a variant of an encoding scheme which is resilient to tampering attacks. The main idea behind non-malleable coding is that the adversary should not be able to obtain any valuable information about the message. Non-malleable codes are used in tamper-resilient cryptography and protecting memories against tampering attacks. Many different types of non-malleability have alre...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1996