Yuen's Criticisms on Security of Quantum Key Distribution and Onward

11/09/2017
by   Takehisa Iwakoshi, et al.
0

Quantum Key Distribution (QKD) has been attracting researchers that it would provide provable security to distribute secret keys since its birth in 1984. Since 2005, the trace distance between an ideal quantum state and an actually distributed state has been employed to evaluate its security level, and the trace distance was given an interpretation that it would be a maximum failure probability in distributing perfectly secure keys. However, in 2009, H. P. Yuen criticized that the trace distance would not have such an interpretation. Since then, O. Hirota, K. Kato, and T. Iwakoshi have been warning to make people pay attention to Yuen's criticisms. In 2015, T. Iwakoshi precisely explained why Yuen has been correct. In 2016, Yuen himself published a paper to explain the potentially unsolved problems in QKD. This study precisely explains the most important problems given in Yuen's paper, and gives recent topics around QKD and other quantum cryptographic protocols.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
11/09/2017

Security of Quantum Key Distribution from Attacker's View

In 2005, trace distance between an ideal quantum state to be distributed...
research
04/04/2023

Establishing shared secret keys on quantum line networks: protocol and security

We show the security of multi-user key establishment on a single line of...
research
01/10/2020

QSOR: Quantum-Safe Onion Routing

In this work, we propose a study on the use of post-quantum cryptographi...
research
09/23/2021

Finite-key Analysis for Quantum Conference Key Agreement with Asymmetric Channels

As an essential ingredient of quantum networks, quantum conference key a...
research
05/04/2021

Quantum Key-length Extension

Should quantum computers become available, they will reduce the effectiv...
research
05/27/2020

A post-quantum key exchange protocol from the intersection of quadric surfaces

In this paper we present a key exchange protocol in which Alice and Bob ...

Please sign up or login with your details

Forgot password? Click here to reset