J 2012

Weak randomness seriously limits the security of quantum key distribution

BOUDA, Jan, Matej PIVOLUSKA, Martin PLESCH and Colin WILMOTT

Basic information

Original name

Weak randomness seriously limits the security of quantum key distribution

Authors

BOUDA, Jan (203 Czech Republic, guarantor, belonging to the institution), Matej PIVOLUSKA (703 Slovakia, belonging to the institution), Martin PLESCH (703 Slovakia, belonging to the institution) and Colin WILMOTT (372 Ireland, belonging to the institution)

Edition

Physical Review A, New York, American physical society, 2012, 1050-2947

Other information

Language

English

Type of outcome

Článek v odborném periodiku

Field of Study

10201 Computer sciences, information science, bioinformatics

Country of publisher

United States of America

Confidentiality degree

není předmětem státního či obchodního tajemství

References:

Impact factor

Impact factor: 3.042

RIV identification code

RIV/00216224:14330/12:00057910

Organization unit

Faculty of Informatics

UT WoS

000315047500002

Keywords in English

weak randomness; quantum key distribution

Tags

Tags

International impact, Reviewed
Změněno: 23/4/2013 15:51, RNDr. Pavel Šmerk, Ph.D.

Abstract

V originále

In usual security proofs of quantum protocols the adversary (Eve) is expected to have full control over any quantum communication between any communicating parties (Alice and Bob). Eve is also expected to have full access to an authenticated classical channel between Alice and Bob. Unconditional security against any attack by Eve can be proved even in the realistic setting of device and channel imperfection. In this paper we show that the security of quantum key distribution protocols is ruined if one allows Eve to possess a very limited access to the random sources used by Alice. Such knowledge should always be expected in realistic experimental conditions via different side channels.

Links

GAP202/12/1142, research and development project
Name: Slabé zdroje entanglementu a náhodnosti
Investor: Czech Science Foundation
GBP202/12/G061, research and development project
Name: Centrum excelence - Institut teoretické informatiky (CE-ITI) (Acronym: CE-ITI)
Investor: Czech Science Foundation
GD102/09/H042, research and development project
Name: Matematické a inženýrské metody pro vývoj spolehlivých a bezpečných paralelních a distribuovaných počítačových systémů
Investor: Czech Science Foundation
MUNI/A/0914/2009, interní kód MU
Name: Rozsáhlé výpočetní systémy: modely, aplikace a verifikace (Acronym: SV-FI MAV)
Investor: Masaryk University, Category A