Leftover Hashing From Quantum Error Correction: Unifying the Two Approaches to the Security Proof of Quantum Key Distribution

Type: Article

Publication Date: 2020-01-27

Citations: 5

DOI: https://doi.org/10.1109/tit.2020.2969656

Abstract

We show that the Mayers-Shor-Preskill approach and Renner's approach to proving the security of quantum key distribution (QKD) are essentially the same. We begin our analysis by considering a special case of QKD called privacy amplification (PA). PA itself is an important building block of cryptography, both classical and quantum. The standard theoretical tool used for its security proof is called the leftover hashing lemma (LHL). We present a direct connection between the LHL and the coding theorem of a certain quantum error correction code. Then we apply this result to proving the equivalence between the two approaches to proving the security of QKD.

Locations

  • arXiv (Cornell University) - View - PDF
  • DataCite API - View
  • IEEE Transactions on Information Theory - View

Similar Works

Action Title Year Authors
+ PDF Chat Leftover Hashing Against Quantum Side Information 2011 Marco Tomamichel
Christian Schaffner
Adam Smith
Renato Renner
+ PDF Chat Equivalence of Three Classical Algorithms With Quantum Side Information: Privacy Amplification, Error Correction, and Data Compression 2021 Toyohiro Tsurumaru
+ Equivalence of three classical algorithms with quantum side information: Privacy amplification, error correction, and data compression. 2021 Toyohiro Tsurumaru
+ Equivalence of three quantum algorithms: Privacy amplification, error correction, and data compression. 2020 Toyohiro Tsurumaru
+ PDF Chat Quantum privacy and Schur product channels 2017 Jeremy Levick
David W. Kribs
Rajesh Pereira
+ Decoupling Theorems 2012 Oleg Szehr
+ PDF Chat Duality of privacy amplification against quantum adversaries and data compression with quantum side information 2010 Joseph M. Renes
+ A Quantum-Proof Non-Malleable Extractor, With Application to Privacy Amplification against Active Quantum Adversaries 2017 Divesh Aggarwal
Kai-Min Chung
Han-Hsuan Lin
Thomas Vidick
+ A Quantum-Proof Non-Malleable Extractor, With Application to Privacy Amplification against Active Quantum Adversaries 2017 Divesh Aggarwal
Kai-Min Chung
Han-Hsuan Lin
Thomas Vidick
+ A Note on Copy-Protection from Random Oracles 2022 Prabhanjan Ananth
Fatih Kaleoglu
+ Quantum ciphertext authentication and key recycling with the trap code 2018 Yfke Dulek
Florian Speelman
+ Quantum ciphertext authentication and key recycling with the trap code 2018 Yfke Dulek
Florian Speelman
+ Unclonability and Quantum Cryptanalysis: From Foundations to Applications 2022 Mina Doosti
+ Computational Notions of Quantum Min-Entropy 2017 Yi-Hsiu Chen
Kai-Min Chung
Ching–Yi Lai
Salil Vadhan
Xiaodi Wu
+ Quantum Learning Algorithms and Post-Quantum Cryptography 2017 Alexander Poremba
+ On non-adaptive quantum chosen-ciphertext attacks and Learning with Errors 2018 Gorjan Alagic
Stacey Jeffery
Māris Ozols
Alexander Poremba
+ Review ofProtecting Information: From Classical Error Correction to Quantum Cryptographyby Susan Loepp and William K. Wootters 2009 Howard E. Brandt
+ A Generic Security Proof for Quantum Key Distribution 2004 Matthias Christandl
Renato Renner
Artur Ekert
+ PDF Chat Insider-Proof Encryption with Applications for Quantum Key Distribution 2014 Matthew McKague
Lana Sheridan
+ A Framework for Non-Asymptotic Quantum Information Theory 2012 Marco Tomamichel