File Download
  Links for fulltext
     (May Require Subscription)
Supplementary

Article: Universally composable and customizable post-processing for practical quantum key distribution

TitleUniversally composable and customizable post-processing for practical quantum key distribution
Authors
KeywordsKey distribution
Post-processing procedure
Quantum cryptography
Security quantification
Universally composable security IT security
Issue Date2011
PublisherElsevier Advanced Technology. The Journal's web site is located at http://www.elsevier.com/locate/compseconline
Citation
Computers And Security, 2011, v. 30 n. 4, p. 172-177 How to Cite?
AbstractIn quantum key distribution (QKD), a secret key is generated between two distant parties by transmitting quantum states. Experimental measurements on the quantum states are then transformed to a secret key by classical post-processing. Here, we propose a construction framework in which QKD classical post-processing can be custom made. Though seemingly obvious, the concept of concatenating classical blocks to form a whole procedure does not automatically apply to the formation of a quantum cryptographic procedure since the security of the entire QKD procedure rests on the laws of quantum mechanics and classical blocks are originally designed and characterized without regard to any properties of these laws. Nevertheless, we justify such concept of concatenating classical blocks in constructing QKD classical post-processing procedures, along with a relation to the universal-composability-security parameter. Consequently, effects arising from an actual QKD experiment, such as those due to the finiteness of the number of signals used, can be dealt with by employing suitable post-processing blocks. Lastly, we use our proposed customizable framework to build a comprehensive generic recipe for classical post-processing that one can follow to derive a secret key from the measurement outcomes in an actual experiment. © 2010 Elsevier Ltd. All rights reserved.
Persistent Identifierhttp://hdl.handle.net/10722/135372
ISSN
2023 Impact Factor: 4.8
2023 SCImago Journal Rankings: 1.566
ISI Accession Number ID
Funding AgencyGrant Number
NSERC
OCE
HKSAR GovernmentHKU 701007P
Funding Information:

We thank C. Erven, N. Godbout, M. Hayashi, D.W. Leung, H.-K. Lo, N. Lutkenhaus, M. Koashi, X. Mo, B. Qi, R. Renner, V. Scarani, D. Stebila, K. Tamaki, W. Tittel, Q. Wang, Y. Zhao and other participants to the workshop Quantum Works QKD Meeting (Waterloo, Canada) and Finite Size Effects in QKD (Singapore) for enlightening discussions. X. Ma especially thanks H.F. Chau for hospitality and support during his visit at the University of Hong Kong. This work is supported from the NSERC, the OCE, and the RGC grant No. HKU 701007P of the HKSAR Government.

References
Grants

 

DC FieldValueLanguage
dc.contributor.authorMa, Xen_HK
dc.contributor.authorFung, CHFen_HK
dc.contributor.authorBoileau, JCen_HK
dc.contributor.authorChau, HFen_HK
dc.date.accessioned2011-07-27T01:34:14Z-
dc.date.available2011-07-27T01:34:14Z-
dc.date.issued2011en_HK
dc.identifier.citationComputers And Security, 2011, v. 30 n. 4, p. 172-177en_HK
dc.identifier.issn0167-4048en_HK
dc.identifier.urihttp://hdl.handle.net/10722/135372-
dc.description.abstractIn quantum key distribution (QKD), a secret key is generated between two distant parties by transmitting quantum states. Experimental measurements on the quantum states are then transformed to a secret key by classical post-processing. Here, we propose a construction framework in which QKD classical post-processing can be custom made. Though seemingly obvious, the concept of concatenating classical blocks to form a whole procedure does not automatically apply to the formation of a quantum cryptographic procedure since the security of the entire QKD procedure rests on the laws of quantum mechanics and classical blocks are originally designed and characterized without regard to any properties of these laws. Nevertheless, we justify such concept of concatenating classical blocks in constructing QKD classical post-processing procedures, along with a relation to the universal-composability-security parameter. Consequently, effects arising from an actual QKD experiment, such as those due to the finiteness of the number of signals used, can be dealt with by employing suitable post-processing blocks. Lastly, we use our proposed customizable framework to build a comprehensive generic recipe for classical post-processing that one can follow to derive a secret key from the measurement outcomes in an actual experiment. © 2010 Elsevier Ltd. All rights reserved.en_HK
dc.languageengen_US
dc.publisherElsevier Advanced Technology. The Journal's web site is located at http://www.elsevier.com/locate/compseconlineen_HK
dc.relation.ispartofComputers and Securityen_HK
dc.rightsNOTICE: this is the author’s version of a work that was accepted for publication in Computers & Security. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be reflected in this document. Changes may have been made to this work since it was submitted for publication. A definitive version was subsequently published in Computers & Security, 2011, v. 30 n. 4, p. 172-177. DOI: 10.1016/j.cose.2010.11.001-
dc.rightsThis work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.-
dc.subjectKey distributionen_HK
dc.subjectPost-processing procedureen_HK
dc.subjectQuantum cryptographyen_HK
dc.subjectSecurity quantificationen_HK
dc.subjectUniversally composable security IT securityen_HK
dc.titleUniversally composable and customizable post-processing for practical quantum key distributionen_HK
dc.typeArticleen_HK
dc.identifier.emailChau, HF: hfchau@hku.hken_HK
dc.identifier.authorityChau, HF=rp00669en_HK
dc.description.naturepostprint-
dc.identifier.doi10.1016/j.cose.2010.11.001en_HK
dc.identifier.scopuseid_2-s2.0-79955474822en_HK
dc.identifier.hkuros186865en_US
dc.relation.referenceshttp://www.scopus.com/mlt/select.url?eid=2-s2.0-79955474822&selection=ref&src=s&origin=recordpageen_HK
dc.identifier.volume30en_HK
dc.identifier.issue4en_HK
dc.identifier.spage172en_HK
dc.identifier.epage177en_HK
dc.identifier.isiWOS:000291176500002-
dc.publisher.placeUnited Kingdomen_HK
dc.relation.projectProperties And Applications Of Quantum Low Density Parity Check And Related Codes-
dc.identifier.scopusauthoridMa, X=9241310600en_HK
dc.identifier.scopusauthoridFung, CHF=8201367800en_HK
dc.identifier.scopusauthoridBoileau, JC=9845482100en_HK
dc.identifier.scopusauthoridChau, HF=7005742276en_HK
dc.identifier.citeulike8263945-
dc.identifier.issnl0167-4048-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats