BOUDA, Jan, Matej PIVOLUSKA, Martin PLESCH and Colin WILMOTT. Weak randomness seriously limits the security of quantum key distribution. Physical Review A. New York: American physical society, 2012, vol. 86, No 6, p. 0623081-0623085. ISSN 1050-2947. Available from: https://dx.doi.org/10.1103/PhysRevA.86.062308.
Other formats:   BibTeX LaTeX RIS
Basic information
Original name Weak randomness seriously limits the security of quantum key distribution
Authors BOUDA, Jan (203 Czech Republic, guarantor, belonging to the institution), Matej PIVOLUSKA (703 Slovakia, belonging to the institution), Martin PLESCH (703 Slovakia, belonging to the institution) and Colin WILMOTT (372 Ireland, belonging to the institution).
Edition Physical Review A, New York, American physical society, 2012, 1050-2947.
Other information
Original language English
Type of outcome Article in a journal
Field of Study 10201 Computer sciences, information science, bioinformatics
Country of publisher United States of America
Confidentiality degree is not subject to a state or trade secret
WWW URL
Impact factor Impact factor: 3.042
RIV identification code RIV/00216224:14330/12:00057910
Organization unit Faculty of Informatics
Doi http://dx.doi.org/10.1103/PhysRevA.86.062308
UT WoS 000315047500002
Keywords in English weak randomness; quantum key distribution
Tags best
Tags International impact, Reviewed
Changed by Changed by: RNDr. Pavel Šmerk, Ph.D., učo 3880. Changed: 23/4/2013 15:51.
Abstract
In usual security proofs of quantum protocols the adversary (Eve) is expected to have full control over any quantum communication between any communicating parties (Alice and Bob). Eve is also expected to have full access to an authenticated classical channel between Alice and Bob. Unconditional security against any attack by Eve can be proved even in the realistic setting of device and channel imperfection. In this paper we show that the security of quantum key distribution protocols is ruined if one allows Eve to possess a very limited access to the random sources used by Alice. Such knowledge should always be expected in realistic experimental conditions via different side channels.
Links
GAP202/12/1142, research and development projectName: Slabé zdroje entanglementu a náhodnosti
Investor: Czech Science Foundation
GBP202/12/G061, research and development projectName: Centrum excelence - Institut teoretické informatiky (CE-ITI) (Acronym: CE-ITI)
Investor: Czech Science Foundation
GD102/09/H042, research and development projectName: Matematické a inženýrské metody pro vývoj spolehlivých a bezpečných paralelních a distribuovaných počítačových systémů
Investor: Czech Science Foundation
MUNI/A/0914/2009, interní kód MUName: Rozsáhlé výpočetní systémy: modely, aplikace a verifikace (Acronym: SV-FI MAV)
Investor: Masaryk University, Category A
PrintDisplayed: 21/7/2024 21:27