Yuen's Criticisms on Security of Quantum Key Distribution and Onward
نویسنده
چکیده
Quantum Key Distribution (QKD) has been attracting researchers that it would provide provable security to distribute secret keys since its birth in 1984. Since 2005, the trace distance between an ideal quantum state and an actually distributed state has been employed to evaluate its security level, and the trace distance was given an interpretation that it would be a maximum failure probability in distributing perfectly secure keys. However, in 2009, H. P. Yuen criticized that the trace distance would not have such an interpretation. Since then, O. Hirota, K. Kato, and T. Iwakoshi have been warning to make people pay attention to Yuen’s criticisms. In 2015, T. Iwakoshi precisely explained why Yuen has been correct. In 2016, Yuen himself published a paper to explain the potentially unsolved problems in QKD. This study precisely explains the most important problems given in Yuen’s paper, and gives recent topics around QKD and other quantum cryptographic protocols.
منابع مشابه
Quantum secret sharing based on a reusable
Reply to Comments on " Quantum Key Distribution for d-level systems for generalized Bell states " [Phys. Rev. A, 052331, (2002)] and " Quantum secret sharing based on a reusable Greenberger-Horne-Zeilinger states as secure carriers " [Phys. Abstract We show that the criticisms of two recent comments [1, 2] on the insecurity of quantum key distributions proposed in [3] and [4] and the secret sha...
متن کاملSecurity of Quantum Key Distribution from Attacker's View
In 2005, trace distance between an ideal quantum state to be distributed and an actually distributed quantum state was introduced as a valid security measure of Quantum Key Distribution (QKD) by R. Renner et al., then it has been perceived that the trace can be interpreted as a maximum failure probability of QKD. While such a perspective has been widely accepted, H. P. Yuen and O. Hirota have b...
متن کاملSecurity of Quantum Key Distribution
We construct a new quantum key distribution scheme and prove its security against the most general type of attacks and the most general type of noises allowed by quantum physics. The novel technique we use is reduction from a quantum scheme to a classical scheme. We first show that, rather surprisingly, the proof of security of our quantum key distribution in the error-free case can be reduced ...
متن کاملLPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring
Communication security of wireless sensor networks is achieved using cryptographic keys assigned to the nodes. Due to resource constraints in such networks, random key pre-distribution schemes are of high interest. Although in most of these schemes no location information is considered, there are scenarios that location information can be obtained by nodes after their deployment. In this paper,...
متن کاملSecurity of Device-Independent Quantum Key Distribution Protocols
Device-independent cryptography represent the strongest form of physical security: it is based on general physical laws and does not require any detailed knowledge or control of the physical devices used in the protocol. We discuss a general security proof valid for a large class of device-independent quantum key distribution protocols. The proof relies on the validity of Quantum Theory and req...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1711.03617 شماره
صفحات -
تاریخ انتشار 2017