Security of Quantum Key Distribution from Attacker's View

11/09/2017
by   Takehisa Iwakoshi, et al.
0

In 2005, trace distance between an ideal quantum state to be distributed and an actual quantum state distributed was introduced as a valid security measure of Quantum Key Distribution (QKD) by R. Renner et al., then it has been perceived that the trace can be interpreted as a maximum failure probability of QKD. While such a perspective has been widely accepted, H. P. Yuen and O. Hirota have been warning that such an interpretation is not correct since 2009. The author of this study has been giving questions on the interpretation of the trace distance based on their criticisms since QIT30 in May 2014, and has been proposing Yuen's idea to evaluate the security of QKD by the probability for the attacker to guess the correct key. However, the author could not give the guessing probability concretely. In this study, the author explains how to derive the average guessing probability for the attacker, where its result equals to Yuen's derivation firstly seen in 2010. From this result, one will see the problems with the maximum failure probability interpretation of the trace distance clearly. This study also explains the indistinguishability advantage interpretation is also invalid.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
11/09/2017

Yuen's Criticisms on Security of Quantum Key Distribution and Onward

Quantum Key Distribution (QKD) has been attracting researchers that it w...
research
07/08/2021

Lower bounds on the error probability of multiple quantum channel discrimination by the Bures angle and the trace distance

Quantum channel discrimination is a fundamental problem in quantum infor...
research
08/18/2021

Estimating distinguishability measures on quantum computers

The performance of a quantum information processing protocol is ultimate...
research
01/30/2020

Analysis of Y00 Protocol under Quantum Generalization of a Fast Correlation Attack: Toward Information-Theoretic Security

In our previous work, it was demonstrated that the attacker could not pi...
research
05/10/2021

Tamper Detection against Unitary Operators

We consider (Enc, Dec) schemes which are used to encode a classical/quan...
research
03/03/2023

Quantum state testing beyond the polarizing regime and quantum triangular discrimination

The complexity class Quantum Statistical Zero-Knowledge (𝖰𝖲𝖹𝖪) captures ...
research
05/17/2023

Interpretation of the principles and implementation of FreeRider: A tutorial

We aims to provide an interpretation of the the design background, motiv...

Please sign up or login with your details

Forgot password? Click here to reset