Classical Security Protocols for QKD Systems
نویسندگان
چکیده
The purpose of this report is to document the three principal classes of classic cryptographic protocols which are needed in systems for quantum key distribution. We will detail the protocols used for secretkey reconciliation by public discussion, privacy ampli cation by public discussion, and unconditionally secure authentication. We suggest the use of the model checking method for the analysis of these protocols and the veri cation of relevant security requirements; the model checking technique is described, and the PRISM model checker is presented. Key words: quantum cryptography secret-key reconciliation privacy ampli cation authentication unconditional security model checking
منابع مشابه
Architecture and protocols of the future European quantum key distribution network
A point-to-point quantum key distribution (QKD) system takes advantage of the laws of quantum physics to establish secret keys between two communicating parties. Compared to the classical methods, such as public-key infrastructures, QKD offers unconditional security, which makes it attractive for very high security applications. However, this unprecedent level of security is mitigated by the in...
متن کاملQuantum Key Distribution in the Classical Authenticated Key Exchange Framework
Key establishment is a crucial primitive for building secure channels in a multi-party setting. Without quantum mechanics, key establishment can only be done under the assumption that some computational problem is hard. Since digital communication can be easily eavesdropped and recorded, it is important to consider the secrecy of information anticipating future algorithmic and computational dis...
متن کاملLower and upper bounds on the secret-key rate for quantum key distribution protocols using one-way classical communication.
We investigate a general class of quantum key distribution (QKD) protocols using one-way classical communication. We show that full security can be proven by considering only collective attacks. We derive computable lower and upper bounds on the secret-key rate of those QKD protocols involving only entropies of two-qubit density operators. As an illustration of our results, we determine new bou...
متن کاملSecurity and performance of continuous-variable quantum key distribution systems. (Performance et sécurité de dispositifs de distribution quantique de clés à variables continues)
This thesis focuses on a cryptographic primitive that allows two distant parties, usually called Alice and Bob, to generate an arbitrary amount of secret key even in the presence of an eavesdropper, provided that they share a short initial secret message. This primitive is called quantum key distribution, or in short QKD; and differs from classical key distribution primitives in the sense that ...
متن کاملExperimentally feasible protocol for semiquantum key distribution
Quantum key distribution (QKD) protocols make it possible for two quantum parties to generate a secret shared key. Semiquantum key distribution (SQKD) protocols, such as “QKD with classical Bob” and “QKD with classical Alice” (that have both been proven robust), achieve this goal even if one of the parties is classical. However, existing SQKD protocols are not experimentally feasible with curre...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006