TY - GEN
T1 - Essential elements lacking in security proofs for quantum key distribution
AU - Yuen, Horace P.
PY - 2013
Y1 - 2013
N2 - All the currently available unconditional security proofs on quantum key distribution, in particular for the BB84 protocol and its variants including continuous-variable ones, are invalid or incomplete at many points. In this paper we discuss some of the main known problems, particularly those on operational security guarantee and error correction. Most basic are the points that there is no security parameter in such protocols and it is not the case the generated key is perfect with probability ≥ 1 - e under the trace distance criterion d ≤ e, which is widely claimed in the technical and popular literature. The many serious security consequences of this error about the QKD generated key would be explained, including practical ramification on achievable security levels. It will be shown how the error correction problem alone may already defy rigorous quantitative analysis. Various other problems would be touched upon. It is pointed out that rigorous security guarantee of much more efficient quantum cryptosystems may be obtained by abandoning the disturbance-information tradeoff principle and utilizing instead the known KCQ (keyed communication in quantum noise) principle in conjunction with a new DBM (decoy bits method) principle that will be detailed elsewhere.
AB - All the currently available unconditional security proofs on quantum key distribution, in particular for the BB84 protocol and its variants including continuous-variable ones, are invalid or incomplete at many points. In this paper we discuss some of the main known problems, particularly those on operational security guarantee and error correction. Most basic are the points that there is no security parameter in such protocols and it is not the case the generated key is perfect with probability ≥ 1 - e under the trace distance criterion d ≤ e, which is widely claimed in the technical and popular literature. The many serious security consequences of this error about the QKD generated key would be explained, including practical ramification on achievable security levels. It will be shown how the error correction problem alone may already defy rigorous quantitative analysis. Various other problems would be touched upon. It is pointed out that rigorous security guarantee of much more efficient quantum cryptosystems may be obtained by abandoning the disturbance-information tradeoff principle and utilizing instead the known KCQ (keyed communication in quantum noise) principle in conjunction with a new DBM (decoy bits method) principle that will be detailed elsewhere.
UR - http://www.scopus.com/inward/record.url?scp=84890083994&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84890083994&partnerID=8YFLogxK
U2 - 10.1117/12.2032082
DO - 10.1117/12.2032082
M3 - Conference contribution
AN - SCOPUS:84890083994
SN - 9780819497680
T3 - Proceedings of SPIE - The International Society for Optical Engineering
BT - Emerging Technologies in Security and Defence; and Quantum Security II; and Unmanned Sensor Systems X
T2 - Emerging Technologies in Security and Defence; and Quantum Security II; and Unmanned Sensor Systems X
Y2 - 23 September 2013 through 26 September 2013
ER -