File Download
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1016/j.cose.2010.11.001
- Scopus: eid_2-s2.0-79955474822
- WOS: WOS:000291176500002
- Find via
Supplementary
- Citations:
- Appears in Collections:
Article: Universally composable and customizable post-processing for practical quantum key distribution
Title | Universally composable and customizable post-processing for practical quantum key distribution | ||||||||
---|---|---|---|---|---|---|---|---|---|
Authors | |||||||||
Keywords | Key distribution Post-processing procedure Quantum cryptography Security quantification Universally composable security IT security | ||||||||
Issue Date | 2011 | ||||||||
Publisher | Elsevier Advanced Technology. The Journal's web site is located at http://www.elsevier.com/locate/compseconline | ||||||||
Citation | Computers And Security, 2011, v. 30 n. 4, p. 172-177 How to Cite? | ||||||||
Abstract | In quantum key distribution (QKD), a secret key is generated between two distant parties by transmitting quantum states. Experimental measurements on the quantum states are then transformed to a secret key by classical post-processing. Here, we propose a construction framework in which QKD classical post-processing can be custom made. Though seemingly obvious, the concept of concatenating classical blocks to form a whole procedure does not automatically apply to the formation of a quantum cryptographic procedure since the security of the entire QKD procedure rests on the laws of quantum mechanics and classical blocks are originally designed and characterized without regard to any properties of these laws. Nevertheless, we justify such concept of concatenating classical blocks in constructing QKD classical post-processing procedures, along with a relation to the universal-composability-security parameter. Consequently, effects arising from an actual QKD experiment, such as those due to the finiteness of the number of signals used, can be dealt with by employing suitable post-processing blocks. Lastly, we use our proposed customizable framework to build a comprehensive generic recipe for classical post-processing that one can follow to derive a secret key from the measurement outcomes in an actual experiment. © 2010 Elsevier Ltd. All rights reserved. | ||||||||
Persistent Identifier | http://hdl.handle.net/10722/135372 | ||||||||
ISSN | 2023 Impact Factor: 4.8 2023 SCImago Journal Rankings: 1.566 | ||||||||
ISI Accession Number ID |
Funding Information: We thank C. Erven, N. Godbout, M. Hayashi, D.W. Leung, H.-K. Lo, N. Lutkenhaus, M. Koashi, X. Mo, B. Qi, R. Renner, V. Scarani, D. Stebila, K. Tamaki, W. Tittel, Q. Wang, Y. Zhao and other participants to the workshop Quantum Works QKD Meeting (Waterloo, Canada) and Finite Size Effects in QKD (Singapore) for enlightening discussions. X. Ma especially thanks H.F. Chau for hospitality and support during his visit at the University of Hong Kong. This work is supported from the NSERC, the OCE, and the RGC grant No. HKU 701007P of the HKSAR Government. | ||||||||
References | |||||||||
Grants |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Ma, X | en_HK |
dc.contributor.author | Fung, CHF | en_HK |
dc.contributor.author | Boileau, JC | en_HK |
dc.contributor.author | Chau, HF | en_HK |
dc.date.accessioned | 2011-07-27T01:34:14Z | - |
dc.date.available | 2011-07-27T01:34:14Z | - |
dc.date.issued | 2011 | en_HK |
dc.identifier.citation | Computers And Security, 2011, v. 30 n. 4, p. 172-177 | en_HK |
dc.identifier.issn | 0167-4048 | en_HK |
dc.identifier.uri | http://hdl.handle.net/10722/135372 | - |
dc.description.abstract | In quantum key distribution (QKD), a secret key is generated between two distant parties by transmitting quantum states. Experimental measurements on the quantum states are then transformed to a secret key by classical post-processing. Here, we propose a construction framework in which QKD classical post-processing can be custom made. Though seemingly obvious, the concept of concatenating classical blocks to form a whole procedure does not automatically apply to the formation of a quantum cryptographic procedure since the security of the entire QKD procedure rests on the laws of quantum mechanics and classical blocks are originally designed and characterized without regard to any properties of these laws. Nevertheless, we justify such concept of concatenating classical blocks in constructing QKD classical post-processing procedures, along with a relation to the universal-composability-security parameter. Consequently, effects arising from an actual QKD experiment, such as those due to the finiteness of the number of signals used, can be dealt with by employing suitable post-processing blocks. Lastly, we use our proposed customizable framework to build a comprehensive generic recipe for classical post-processing that one can follow to derive a secret key from the measurement outcomes in an actual experiment. © 2010 Elsevier Ltd. All rights reserved. | en_HK |
dc.language | eng | en_US |
dc.publisher | Elsevier Advanced Technology. The Journal's web site is located at http://www.elsevier.com/locate/compseconline | en_HK |
dc.relation.ispartof | Computers and Security | en_HK |
dc.rights | NOTICE: this is the author’s version of a work that was accepted for publication in Computers & Security. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be reflected in this document. Changes may have been made to this work since it was submitted for publication. A definitive version was subsequently published in Computers & Security, 2011, v. 30 n. 4, p. 172-177. DOI: 10.1016/j.cose.2010.11.001 | - |
dc.rights | This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License. | - |
dc.subject | Key distribution | en_HK |
dc.subject | Post-processing procedure | en_HK |
dc.subject | Quantum cryptography | en_HK |
dc.subject | Security quantification | en_HK |
dc.subject | Universally composable security IT security | en_HK |
dc.title | Universally composable and customizable post-processing for practical quantum key distribution | en_HK |
dc.type | Article | en_HK |
dc.identifier.email | Chau, HF: hfchau@hku.hk | en_HK |
dc.identifier.authority | Chau, HF=rp00669 | en_HK |
dc.description.nature | postprint | - |
dc.identifier.doi | 10.1016/j.cose.2010.11.001 | en_HK |
dc.identifier.scopus | eid_2-s2.0-79955474822 | en_HK |
dc.identifier.hkuros | 186865 | en_US |
dc.relation.references | http://www.scopus.com/mlt/select.url?eid=2-s2.0-79955474822&selection=ref&src=s&origin=recordpage | en_HK |
dc.identifier.volume | 30 | en_HK |
dc.identifier.issue | 4 | en_HK |
dc.identifier.spage | 172 | en_HK |
dc.identifier.epage | 177 | en_HK |
dc.identifier.isi | WOS:000291176500002 | - |
dc.publisher.place | United Kingdom | en_HK |
dc.relation.project | Properties And Applications Of Quantum Low Density Parity Check And Related Codes | - |
dc.identifier.scopusauthorid | Ma, X=9241310600 | en_HK |
dc.identifier.scopusauthorid | Fung, CHF=8201367800 | en_HK |
dc.identifier.scopusauthorid | Boileau, JC=9845482100 | en_HK |
dc.identifier.scopusauthorid | Chau, HF=7005742276 | en_HK |
dc.identifier.citeulike | 8263945 | - |
dc.identifier.issnl | 0167-4048 | - |