-
Security of Partially Corrupted Repeater Chains
Authors:
Adrian Harkness,
Walter O. Krawec,
Bing Wang
Abstract:
Quantum Key Distribution allows two parties to establish a secret key that is secure against computationally unbounded adversaries. To extend the distance between parties, quantum networks, and in particular repeater chains, are vital. Typically, security in such scenarios assumes the absolute worst case: namely, an adversary has complete control over all repeaters and fiber links in a network and…
▽ More
Quantum Key Distribution allows two parties to establish a secret key that is secure against computationally unbounded adversaries. To extend the distance between parties, quantum networks, and in particular repeater chains, are vital. Typically, security in such scenarios assumes the absolute worst case: namely, an adversary has complete control over all repeaters and fiber links in a network and is able to replace them with perfect devices, thus allowing her to hide her attack within the expected natural noise. In a large-scale network, however, such a powerful attack may be infeasible. In this paper, we analyze the case where the adversary can only corrupt a contiguous subset of a repeater chain connecting Alice and Bob, while some portion of the network near Alice and Bob may be considered safe from attack (though still noisy). We derive a rigorous finite key proof of security assuming this attack model and show that improved performance and noise tolerances are possible.
△ Less
Submitted 24 June, 2024;
originally announced June 2024.
-
Efficient Multiparty Quantum Key Distribution over Quantum Networks
Authors:
Samuel Oslovich,
Bing Wang,
Walter Krawec,
Kenneth Goodenough
Abstract:
Multiparty quantum key distribution (QKD) is useful for many applications that involve secure communication or collaboration among multiple parties. While it can be achieved using pairwise QKD, a more efficient approach is to achieve it using multipartite entanglement distributed over quantum networks that connect the multiple parties. Existing studies on multipartite entanglement distribution, ho…
▽ More
Multiparty quantum key distribution (QKD) is useful for many applications that involve secure communication or collaboration among multiple parties. While it can be achieved using pairwise QKD, a more efficient approach is to achieve it using multipartite entanglement distributed over quantum networks that connect the multiple parties. Existing studies on multipartite entanglement distribution, however, are not designed for multiparty QKD, and hence do not aim to maximize secret key generation rate. In this paper, we design efficient strategies for multiparty QKD over quantum networks. For 3-party QKD, we derive closed-form expressions for analyzing key distribution over quantum networks. We then use it to develop an efficient strategy for 3-party QKD by packing multiple stars that connect the 3 parties. For the general form of N-party QKD, we develop an approach that packs multiple trees to connect the N parties, while directly incorporating the estimated key rates on network paths. Extensive evaluation of our strategies, in both grid and random graphs, under a wide range of settings, demonstrates that our schemes achieve high key rate, which degrades gracefully when increasing the number of parties.
△ Less
Submitted 30 April, 2024;
originally announced April 2024.
-
Finite Key Security of Simplified Trusted Node Networks
Authors:
Walter O. Krawec,
Bing Wang,
Ryan Brown
Abstract:
Simplified trusted nodes (STNs) are a form of trusted node for quantum key distribution (QKD) networks which do not require running a full QKD stack every instance (i.e., they do not need to run error correction and privacy amplification each session). Such systems hold the advantage that they may be implemented with weaker computational abilities, than regular TNs, while still kee** up with key…
▽ More
Simplified trusted nodes (STNs) are a form of trusted node for quantum key distribution (QKD) networks which do not require running a full QKD stack every instance (i.e., they do not need to run error correction and privacy amplification each session). Such systems hold the advantage that they may be implemented with weaker computational abilities, than regular TNs, while still kee** up with key generation rate demands. The downside is that noise tolerance is lower. However, to get a better understanding of their suitability in various scenarios, one requires practical, finite-key security bounds for STN networks. So far, only theoretical asymptotic bounds are known. In this work we derive a new proof of security for STN chains in the finite key setting. We also derive a novel cost function allowing us to evaluate when STNs would be beneficial from a computational cost perspective, compared with regular TN networks.
△ Less
Submitted 26 April, 2024;
originally announced April 2024.
-
New Security Proof of a Restricted High-Dimensional QKD Protocol
Authors:
Hasan Iqbal,
Walter O. Krawec
Abstract:
High-dimensional (HD) states are known to have several interesting properties when applied to quantum cryptography. For quantum key distribution (QKD), these states have the potential to improve noise tolerance and efficiency. However, creating, and measuring, HD states is technologically challenging, thus making it important to study HD-QKD protocols where Alice and Bob are restricted in their qu…
▽ More
High-dimensional (HD) states are known to have several interesting properties when applied to quantum cryptography. For quantum key distribution (QKD), these states have the potential to improve noise tolerance and efficiency. However, creating, and measuring, HD states is technologically challenging, thus making it important to study HD-QKD protocols where Alice and Bob are restricted in their quantum capabilities. In this paper, we revisit a particular HD-QKD protocol, introduced in (PRA 97 (4):042347, 2018), which does not require Alice and Bob to be capable of sending and measuring in full mutually unbiased bases. In a way, the protocol is a HD version of the three state BB84: one full basis is used for key distillation, but only a single state is used, from an alternative basis, for testing the fidelity of the channel.
The previous proof of security for this protocol has relied on numerical methods, making it difficult to evaluate for high dimensions. In this work, we provide a new proof of security, and give an explicit key-rate equation for depolarization channels, allowing us to evaluate the key-rate for arbitrarily high dimensional states. Furthermore, our new proof produces better results than prior work for dimensions greater than eight, and shows that HD-states can benefit restricted protocols of this nature.
△ Less
Submitted 7 February, 2024; v1 submitted 18 July, 2023;
originally announced July 2023.
-
Blockwise Key Distillation in Satellite-based Quantum Key Distribution
Authors:
Minu J. Bae,
Nitish K. Panigrahy,
Prajit Dhara,
Walter O. Krawec,
Alexander Russell,
Don Towsley,
Bing Wang
Abstract:
Free-space satellite communication has significantly lower photon loss than terrestrial communication via optical fibers. Satellite-based quantum key distribution (QKD) leverages this advantage and provides a promising direction in achieving long-distance inter-continental QKD. Satellite channels, however, can be highly dynamic due to various environmental factors and time-of-the-day effects, lead…
▽ More
Free-space satellite communication has significantly lower photon loss than terrestrial communication via optical fibers. Satellite-based quantum key distribution (QKD) leverages this advantage and provides a promising direction in achieving long-distance inter-continental QKD. Satellite channels, however, can be highly dynamic due to various environmental factors and time-of-the-day effects, leading to heterogeneous noises over time. In this paper, we compare two key distillation techniques for satellite-based QKD. One is the traditional {\em non-blockwise} strategy that treats all the signals as a whole; the other is a {\em blockwise} strategy that divides the signals into individual blocks that have similar noise characteristics and processes them independently. Through extensive simulation in a wide range of settings, we show trends in optimal parameter choices and when one strategy provides better key generation rates than the other. Our results show that the blockwise strategy can lead to up to $5\%$ key rate improvement (leading to on average $1.9\times10^{7}$ more key bits per day) when considering two types of blocks, i.e., for nighttime and daytime, respectively. The blockwise strategy only requires changes in the classical post-processing stage of QKD and can be easily deployed in existing satellite systems.
△ Less
Submitted 9 July, 2023;
originally announced July 2023.
-
Entropic Uncertainty for Biased Measurements
Authors:
Walter O. Krawec
Abstract:
Entropic uncertainty relations are powerful tools, especially in quantum cryptography. They typically bound the amount of uncertainty a third-party adversary may hold on a measurement outcome as a result of the measurement overlap. However, when the two measurement bases are biased towards one another, standard entropic uncertainty relations do not always provide optimal lower bounds on the entrop…
▽ More
Entropic uncertainty relations are powerful tools, especially in quantum cryptography. They typically bound the amount of uncertainty a third-party adversary may hold on a measurement outcome as a result of the measurement overlap. However, when the two measurement bases are biased towards one another, standard entropic uncertainty relations do not always provide optimal lower bounds on the entropy. Here, we derive a new entropic uncertainty relation, for certain quantum states and for instances where the two measurement bases are no longer mutually unbiased. We evaluate our bound on two different quantum cryptographic protocols, including BB84 with faulty/biased measurement devices, and show that our new bound can produce higher key-rates under several scenarios when compared with prior work using standard entropic uncertainty relations.
△ Less
Submitted 16 May, 2023;
originally announced May 2023.
-
Dynamic Routing for Quantum Key Distribution Networks
Authors:
Omar Amer,
Walter O. Krawec,
Victoria U. Manfredi,
Bing Wang
Abstract:
In this paper, we consider quantum key distribution (QKD) in a quantum network with both quantum repeaters and a small number of trusted nodes. In contrast to current QKD networks with only trusted nodes and the true Quantum Internet with only quantum repeaters, such networks represent a middle ground, serving as near-future QKD networks. In this setting, QKD can be efficiently and practically dep…
▽ More
In this paper, we consider quantum key distribution (QKD) in a quantum network with both quantum repeaters and a small number of trusted nodes. In contrast to current QKD networks with only trusted nodes and the true Quantum Internet with only quantum repeaters, such networks represent a middle ground, serving as near-future QKD networks. In this setting, QKD can be efficiently and practically deployed, while providing insights for the future true Quantum Internet. To significantly improve the key generation efficiency in such networks, we develop a new dynamic routing strategy that makes routing decisions based on the current network state, as well as evaluate various classical/quantum post-processing techniques. Using simulations, we show that our dynamic routing strategy can improve the key rate between two users significantly in settings with asymmetric trusted node placement. The post-processing techniques can also increase key rates in high noise scenarios. Furthermore, combining the dynamic routing strategy with the post-processing techniques can further improve the overall performance of the QKD network.
△ Less
Submitted 6 December, 2022;
originally announced December 2022.
-
Semi-Quantum Random Number Generation
Authors:
Julia Guskind,
Walter O. Krawec
Abstract:
Semi-quantum cryptography involves at least one user who is semi-quantum or "classical" in nature. Such a user can only interact with the quantum channel in a very restricted way. Many semi-quantum key distribution protocols have been developed, some with rigorous proofs of security. Here we show for the first time, to our knowledge, that quantum random number generation is possible in the semi-qu…
▽ More
Semi-quantum cryptography involves at least one user who is semi-quantum or "classical" in nature. Such a user can only interact with the quantum channel in a very restricted way. Many semi-quantum key distribution protocols have been developed, some with rigorous proofs of security. Here we show for the first time, to our knowledge, that quantum random number generation is possible in the semi-quantum setting. We also develop a rigorous proof of security, deriving a bound on the random bit generation rate of the protocol as a function of noise in the channel. Our protocol and proof may be broadly applicable to other quantum and semi-quantum cryptographic scenarios where users are limited in their capabilities.
△ Less
Submitted 28 October, 2022;
originally announced October 2022.
-
Improved Semi-Quantum Key Distribution with Two Almost-Classical Users
Authors:
Saachi Mutreja,
Walter O. Krawec
Abstract:
Semi-quantum key distribution (SQKD) protocols attempt to establish a shared secret key between users, secure against computationally unbounded adversaries. Unlike standard quantum key distribution protocols, SQKD protocols contain at least one user who is limited in their quantum abilities and is almost "classical" in nature. In this paper, we revisit a mediated semi-quantum key distribution prot…
▽ More
Semi-quantum key distribution (SQKD) protocols attempt to establish a shared secret key between users, secure against computationally unbounded adversaries. Unlike standard quantum key distribution protocols, SQKD protocols contain at least one user who is limited in their quantum abilities and is almost "classical" in nature. In this paper, we revisit a mediated semi-quantum key distribution protocol, introduced by Massa et al., in 2019, where users need only the ability to detect a qubit, or reflect a qubit; they do not need to perform any other basis measurement; nor do they need to prepare quantum signals. Users require the services of a quantum server which may be controlled by the adversary. In this paper, we show how this protocol may be extended to improve its efficiency and also its noise tolerance. We discuss an extension which allows more communication rounds to be directly usable; we analyze the key-rate of this extension in the asymptotic scenario for a particular class of attacks and compare with prior work. Finally, we evaluate the protocol's performance in a variety of lossy and noisy channels.
△ Less
Submitted 20 March, 2022;
originally announced March 2022.
-
Security of a High Dimensional Two-Way Quantum Key Distribution Protocol
Authors:
Walter O. Krawec
Abstract:
Two-way quantum key distribution protocols utilize bi-directional quantum communication to establish a shared secret key. Due to the increased attack surface, security analyses remain challenging. Here we investigate a high-dimensional variant of the ** Pong protocol and perform an information theoretic security analysis in the finite-key setting. Our methods may be broadly applicable to other Q…
▽ More
Two-way quantum key distribution protocols utilize bi-directional quantum communication to establish a shared secret key. Due to the increased attack surface, security analyses remain challenging. Here we investigate a high-dimensional variant of the ** Pong protocol and perform an information theoretic security analysis in the finite-key setting. Our methods may be broadly applicable to other QKD protocols, especially those relying on two-way channels. Along the way, we show some fascinating benefits to high-dimensional quantum states applied to two-way quantum communication.
△ Less
Submitted 6 March, 2022;
originally announced March 2022.
-
High-Dimensional Quantum Conference Key Agreement
Authors:
Omar Amer,
Walter O. Krawec
Abstract:
Quantum Conference Key Agreement (QCKA) protocols are designed to allow multiple parties to agree on a shared secret key, secure against computationally unbounded adversaries. In this paper, we consider a high-dimensional QCKA protocol and prove its information theoretic security against arbitrary, general, attacks in the finite-key scenario. Our proof technique may be useful for other high-dimens…
▽ More
Quantum Conference Key Agreement (QCKA) protocols are designed to allow multiple parties to agree on a shared secret key, secure against computationally unbounded adversaries. In this paper, we consider a high-dimensional QCKA protocol and prove its information theoretic security against arbitrary, general, attacks in the finite-key scenario. Our proof technique may be useful for other high-dimensional multi-party quantum cryptographic protocols. Finally, we evaluate the protocol in a variety of settings, showing that high-dimensional states can greatly benefit QCKA protocols.
△ Less
Submitted 31 January, 2022;
originally announced February 2022.
-
Mediated Semi-Quantum Key Distribution with Improved Efficiency
Authors:
Julia Guskind,
Walter O. Krawec
Abstract:
Mediated semi-quantum key distribution involves the use of two end-users who have very restricted, almost classical, capabilities, who wish to establish a shared secret key using the help of a fully-quantum server who may be adversarial. In this paper, we introduce a new mediated semi-quantum key distribution protocol, extending prior work, which has asymptotically perfect efficiency. Though this…
▽ More
Mediated semi-quantum key distribution involves the use of two end-users who have very restricted, almost classical, capabilities, who wish to establish a shared secret key using the help of a fully-quantum server who may be adversarial. In this paper, we introduce a new mediated semi-quantum key distribution protocol, extending prior work, which has asymptotically perfect efficiency. Though this comes at the cost of decreased noise tolerance, our protocol is backwards compatible with prior work, so users may easily switch to the old (normally less efficient) protocol if the noise level is high enough to justify it. To prove security, we show an interesting reduction from the mediated semi-quantum scenario to a fully-quantum entanglement based protocol which may be useful when proving the security of other multi-user QKD protocols.
△ Less
Submitted 24 May, 2022; v1 submitted 2 November, 2021;
originally announced November 2021.
-
Analysis of a High-Dimensional Extended B92 Protocol
Authors:
Hasan Iqbal,
Walter O. Krawec
Abstract:
Quantum key distribution (QKD) allows two parties to establish a shared secret key that is secure against all-powerful adversaries. One such protocol named B92 is quite appealing due to its simplicity but is highly sensitive to channel noise. In this work, we investigate a high-dimensional variant of an extended version of the B92 protocol and show that it can distill a key over high noise channel…
▽ More
Quantum key distribution (QKD) allows two parties to establish a shared secret key that is secure against all-powerful adversaries. One such protocol named B92 is quite appealing due to its simplicity but is highly sensitive to channel noise. In this work, we investigate a high-dimensional variant of an extended version of the B92 protocol and show that it can distill a key over high noise channels. The protocol we consider requires that Alice send only three high-dimensional states and Bob only perform partial measurements. We perform an information-theoretic security analysis of our protocol and compare its key rate to that of a high-dimensional BB84 protocol over depolarization and amplitude dam** channels.
△ Less
Submitted 21 June, 2021;
originally announced June 2021.
-
Source Independent Quantum Walk Random Number Generation
Authors:
Minwoo Bae,
Walter O. Krawec
Abstract:
Source independent quantum random number generators (SI-QRNG) are cryptographic protocols which attempt to extract random strings from quantum sources where the source is under the control of an adversary while the measurement devices are fully characterized. This represents a middle-ground between fully-trusted and full-device independence, allowing for fast bit-generation rates with current-day…
▽ More
Source independent quantum random number generators (SI-QRNG) are cryptographic protocols which attempt to extract random strings from quantum sources where the source is under the control of an adversary while the measurement devices are fully characterized. This represents a middle-ground between fully-trusted and full-device independence, allowing for fast bit-generation rates with current-day technology, while also providing a strong security guarantee. In this paper we analyze an SI-QRNG protocol based on quantum walks and develop a new proof technique to show security.
△ Less
Submitted 3 September, 2021; v1 submitted 3 February, 2021;
originally announced February 2021.
-
Quantum Sampling for Optimistic Finite Key Rates in High Dimensional Quantum Cryptography
Authors:
Keegan Yao,
Walter O. Krawec,
Jiadong Zhu
Abstract:
It has been shown recently that the framework of quantum sampling, as introduced by Bouman and Fehr, can lead to new entropic uncertainty relations highly applicable to finite-key cryptographic analyses. Here we revisit these so-called sampling-based entropic uncertainty relations, deriving newer, more powerful, relations and applying them to source-independent quantum random number generators and…
▽ More
It has been shown recently that the framework of quantum sampling, as introduced by Bouman and Fehr, can lead to new entropic uncertainty relations highly applicable to finite-key cryptographic analyses. Here we revisit these so-called sampling-based entropic uncertainty relations, deriving newer, more powerful, relations and applying them to source-independent quantum random number generators and high-dimensional quantum key distribution protocols. Along the way, we prove several interesting results in the asymptotic case for our entropic uncertainty relations. These sampling-based approaches to entropic uncertainty, and their application to quantum cryptography, hold great potential for deriving proofs of security for quantum cryptographic systems, and the approaches we use here may be applicable to an even wider range of scenarios.
△ Less
Submitted 7 December, 2020;
originally announced December 2020.
-
Security Proof Against Collective Attacks for an Experimentally Feasible Semiquantum Key Distribution Protocol
Authors:
Walter O. Krawec,
Rotem Liss,
Tal Mor
Abstract:
Semiquantum key distribution (SQKD) allows two parties (Alice and Bob) to create a shared secret key, even if one of these parties (say, Alice) is classical. However, most SQKD protocols suffer from severe practical security problems when implemented using photons. The recently developed "Mirror protocol" [Boyer, Katz, Liss, and Mor, Phys. Rev. A 96, 062335 (2017)] is an experimentally feasible SQ…
▽ More
Semiquantum key distribution (SQKD) allows two parties (Alice and Bob) to create a shared secret key, even if one of these parties (say, Alice) is classical. However, most SQKD protocols suffer from severe practical security problems when implemented using photons. The recently developed "Mirror protocol" [Boyer, Katz, Liss, and Mor, Phys. Rev. A 96, 062335 (2017)] is an experimentally feasible SQKD protocol overcoming those drawbacks. The Mirror protocol was proven robust (namely, it was proven secure against a limited class of attacks including all noiseless attacks), but its security in case some noise is allowed (natural or due to eavesdrop**) has not been proved yet. Here we prove security of the Mirror protocol against a wide class of quantum attacks (the "collective attacks"), and we evaluate the allowed noise threshold and the resulting key rate.
△ Less
Submitted 3 July, 2023; v1 submitted 3 December, 2020;
originally announced December 2020.
-
Efficient Routing for Quantum Key Distribution Networks
Authors:
Omar Amer,
Walter O. Krawec,
Bing Wang
Abstract:
As quantum key distribution becomes increasingly practical, questions of how to effectively employ it in large-scale networks and over large distances becomes increasingly important. To that end, in this work, we model the performance of the E91 entanglement based QKD protocol when operating in a network consisting of both quantum repeaters and trusted nodes. We propose a number of routing protoco…
▽ More
As quantum key distribution becomes increasingly practical, questions of how to effectively employ it in large-scale networks and over large distances becomes increasingly important. To that end, in this work, we model the performance of the E91 entanglement based QKD protocol when operating in a network consisting of both quantum repeaters and trusted nodes. We propose a number of routing protocols for this network and compare their performance under different usage scenarios. Through our modeling, we investigate optimal placement and number of trusted nodes versus repeaters depending on device performance (e.g., quality of the repeater's measurement devices). Along the way we discover interesting lessons determining what are the important physical aspects to improve for upcoming quantum networks in order to improve secure communication rates.
△ Less
Submitted 30 July, 2020; v1 submitted 25 May, 2020;
originally announced May 2020.
-
A New High-Dimensional Quantum Entropic Uncertainty Relation with Applications
Authors:
Walter O. Krawec
Abstract:
In this paper we derive a new quantum entropic uncertainty relation, bounding the conditional smooth quantum min entropy based on the result of a measurement using a two outcome POVM and the failure probability of a classical sampling strategy. Our relation works for systems of arbitrary finite dimension. We apply it to analyze a new source independent quantum random number generation protocol and…
▽ More
In this paper we derive a new quantum entropic uncertainty relation, bounding the conditional smooth quantum min entropy based on the result of a measurement using a two outcome POVM and the failure probability of a classical sampling strategy. Our relation works for systems of arbitrary finite dimension. We apply it to analyze a new source independent quantum random number generation protocol and show our relation provides optimistic results compared to prior work.
△ Less
Submitted 23 May, 2020; v1 submitted 10 May, 2020;
originally announced May 2020.
-
Finite Key Analysis of the Extended B92 Protocol
Authors:
Omar Amer,
Walter O. Krawec
Abstract:
In this paper we derive a key rate expression for the extended version of the B92 quantum key distribution protocol that takes into account, for the first time, the effects of operating with finite resources. With this expression, we conduct an analysis of the protocol in a variety of different noise and key-length settings, and compare to previous bounds on comparable protocols.
In this paper we derive a key rate expression for the extended version of the B92 quantum key distribution protocol that takes into account, for the first time, the effects of operating with finite resources. With this expression, we conduct an analysis of the protocol in a variety of different noise and key-length settings, and compare to previous bounds on comparable protocols.
△ Less
Submitted 16 January, 2020;
originally announced January 2020.
-
Quantum-Secure Microgrid
Authors:
Zefan Tang,
Yanyuan Qin,
Zimin Jiang,
Walter O. Krawec,
Peng Zhang
Abstract:
Existing microgrid communication relies on classical public key systems, which are vulnerable to attacks from quantum computers. This paper uses quantum key distribution (QKD) to solve these quantum-era microgrid challenges. Specifically, this paper makes the following novel contributions: 1) it offers a QKD-based microgrid communication architecture for microgrids; 2) it shows how to build a quan…
▽ More
Existing microgrid communication relies on classical public key systems, which are vulnerable to attacks from quantum computers. This paper uses quantum key distribution (QKD) to solve these quantum-era microgrid challenges. Specifically, this paper makes the following novel contributions: 1) it offers a QKD-based microgrid communication architecture for microgrids; 2) it shows how to build a quantum-secure microgrid testbed in an RTDS environment; 3) it develops a key pool sharing (KPS) strategy to improve the cyberattack resilience of the QKD-based microgrid; and 4) it analyzes the impacts of critical QKD parameters with the testbed. Test results provide insightful resources for building a quantum-secure microgrid.
△ Less
Submitted 7 January, 2020;
originally announced January 2020.
-
Semi-Quantum Cryptography
Authors:
Hasan Iqbal,
Walter O. Krawec
Abstract:
Semi-quantum communication, a model introduced in 2007 by M. Boyer, D. Kenigsberg, and T. Mor (PRL 99 140501), involves the use of fully-quantum users and semi-quantum, or "classical" users. These restricted users are only allowed to interact with the quantum channel in a limited manner. Originally introduced to study the key-distribution problem, semi-quantum research has since expanded, and cont…
▽ More
Semi-quantum communication, a model introduced in 2007 by M. Boyer, D. Kenigsberg, and T. Mor (PRL 99 140501), involves the use of fully-quantum users and semi-quantum, or "classical" users. These restricted users are only allowed to interact with the quantum channel in a limited manner. Originally introduced to study the key-distribution problem, semi-quantum research has since expanded, and continues to grow, with new protocols, security proof methods, experimental implementations, and new cryptographic applications beyond key distribution. Research in the field of semi-quantum cryptography requires new insights into working with restricted protocols and, so, the tools and techniques derived in this field can translate to results in broader quantum information science. Furthermore, other questions such as the connection between quantum and classical processing, including how classical information processing can be used to counteract a quantum deficiency in a protocol, can shed light on important theoretical questions.
This work surveys the history and current state-of-the-art in semi-quantum research. We discuss the model and several protocols offering the reader insight into how protocols are constructed in this realm. We discuss security proof methods and how classical post-processing can be used to counteract users' inability to perform certain quantum operations. Moving beyond key distribution, we survey current work in other semi-quantum cryptographic protocols and current trends. We also survey recent work done in attempting to construct practical semi-quantum systems including recent experimental results in this field. Finally, as this is still a growing field, we highlight, throughout this survey, several open problems that we feel are important to investigate in the hopes that this will spur even more research in this topic.
△ Less
Submitted 11 October, 2019;
originally announced October 2019.
-
Experimental Semi-quantum Key Distribution With Classical Users
Authors:
Francesco Massa,
Preeti Yadav,
Amir Moqanaki,
Walter O. Krawec,
Paulo Mateus,
Nikola Paunković,
André Souto,
Philip Walther
Abstract:
Quantum key distribution, which allows two distant parties to share an unconditionally secure cryptographic key, promises to play an important role in the future of communication. For this reason such technique has attracted many theoretical and experimental efforts, thus becoming one of the most prominent quantum technologies of the last decades. The security of the key relies on quantum mechanic…
▽ More
Quantum key distribution, which allows two distant parties to share an unconditionally secure cryptographic key, promises to play an important role in the future of communication. For this reason such technique has attracted many theoretical and experimental efforts, thus becoming one of the most prominent quantum technologies of the last decades. The security of the key relies on quantum mechanics and therefore requires the users to be capable of performing quantum operations, such as state preparation or measurements in multiple bases. A natural question is whether and to what extent these requirements can be relaxed and the quantum capabilities of the users reduced. Here we demonstrate a novel quantum key distribution scheme, where users are fully classical. In our protocol, the quantum operations are performed by an untrusted third party acting as a server, which gives the users access to a superimposed single photon, and the key exchange is achieved via interaction-free measurements on the shared state. We also provide a full security proof of the protocol by computing the secret key rate in the realistic scenario of finite-resources, as well as practical experimental conditions of imperfect photon source and detectors. Our approach deepens the understanding of the fundamental principles underlying quantum key distribution and, at the same time, opens up new interesting possibilities for quantum cryptography networks
△ Less
Submitted 18 September, 2022; v1 submitted 5 August, 2019;
originally announced August 2019.
-
High-Dimensional Semi-Quantum Cryptography
Authors:
Hasan Iqbal,
Walter O. Krawec
Abstract:
A semi-quantum key distribution (SQKD) protocol allows two users, one of whom is restricted in their quantum capabilities, to establish a shared secret key, secure against an all-powerful adversary. In this paper, we design a new SQKD protocol using high-dimensional quantum states and conduct an information theoretic security analysis. We show that, similar to the fully-quantum key distribution ca…
▽ More
A semi-quantum key distribution (SQKD) protocol allows two users, one of whom is restricted in their quantum capabilities, to establish a shared secret key, secure against an all-powerful adversary. In this paper, we design a new SQKD protocol using high-dimensional quantum states and conduct an information theoretic security analysis. We show that, similar to the fully-quantum key distribution case, high-dimensional systems can increase the noise tolerance in the semi-quantum case. Along the way, we prove several general security results which are applicable to other SQKD protocols (both high-dimensional ones and standard qubit-based protocols).
△ Less
Submitted 25 July, 2019;
originally announced July 2019.
-
From Classical to Semi-Quantum Secure Communication
Authors:
Allison Gagliano,
Walter O. Krawec,
Hasan Iqbal
Abstract:
In this work we introduce a novel QKD protocol capable of smoothly transitioning, via user-tuneable parameter, from classical to semi-quantum in order to help understand the effect of quantum communication resources on secure key distribution. We perform an information theoretic security analysis of this protocol to determine what level of "quantumness" is sufficient to achieve security, and we di…
▽ More
In this work we introduce a novel QKD protocol capable of smoothly transitioning, via user-tuneable parameter, from classical to semi-quantum in order to help understand the effect of quantum communication resources on secure key distribution. We perform an information theoretic security analysis of this protocol to determine what level of "quantumness" is sufficient to achieve security, and we discover some rather interesting properties of this protocol along the way.
△ Less
Submitted 6 January, 2019;
originally announced January 2019.
-
Semi-Quantum Key Distribution with High Quantum Noise Tolerance
Authors:
Omar Amer,
Walter O. Krawec
Abstract:
Semi-quantum key distribution protocols are designed to allow two parties to establish a shared secret key, secure against an all-powerful adversary, even when one of the users is restricted to measuring and preparing quantum states in one single basis. While interesting from a theoretical standpoint, these protocols have the disadvantage that a two-way quantum communication channel is necessary w…
▽ More
Semi-quantum key distribution protocols are designed to allow two parties to establish a shared secret key, secure against an all-powerful adversary, even when one of the users is restricted to measuring and preparing quantum states in one single basis. While interesting from a theoretical standpoint, these protocols have the disadvantage that a two-way quantum communication channel is necessary which generally limits their theoretical efficiency and noise tolerance. In this paper, we construct a new semi-quantum key distribution (SQKD) protocol which actually takes advantage of this necessary two-way channel, and, after performing an information theoretic security analysis against collective attacks, we show it is able to tolerate a channel noise level higher than any prior SQKD protocol to-date. We also compare the noise tolerance of our protocol to other two-way fully quantum protocols, along with BB84 with Classical Advantage Distillation (CAD). We also comment on some practical issues involving semi-quantum key distribution (in particular, concerning the potential complexity in physical implementation of our protocol as compared with other standard QKD protocols). Finally, we develop techniques that can be applied to the security analysis of other (S)QKD protocols reliant on a two-way quantum communication channel.
△ Less
Submitted 13 November, 2019; v1 submitted 10 December, 2018;
originally announced December 2018.
-
Quantum Sampling and Entropic Uncertainty
Authors:
Walter O. Krawec
Abstract:
In this paper, we show an interesting connection between a quantum sampling technique and quantum uncertainty. Namely, we use the quantum sampling technique, introduced by Bouman and Fehr, to derive a novel entropic uncertainty relation based on smooth min entropy, the binary Shannon entropy of an observed outcome, and the probability of failure of a classical sampling strategy. We then show two a…
▽ More
In this paper, we show an interesting connection between a quantum sampling technique and quantum uncertainty. Namely, we use the quantum sampling technique, introduced by Bouman and Fehr, to derive a novel entropic uncertainty relation based on smooth min entropy, the binary Shannon entropy of an observed outcome, and the probability of failure of a classical sampling strategy. We then show two applications of our new relation. First, we use it to develop a simple proof of a version of the Maassen and Uffink uncertainty relation. Second, we show how it may be applied to quantum random number generation.
△ Less
Submitted 13 November, 2019; v1 submitted 23 April, 2018;
originally announced April 2018.
-
Key-Rate Bound of a Semi-Quantum Protocol Using an Entropic Uncertainty Relation
Authors:
Walter O. Krawec
Abstract:
In this paper we present a new proof technique for semi-quantum key distribution protocols which makes use of a quantum entropic uncertainty relation to bound an adversary's information. Our new technique provides a more optimistic key-rate bound than previous work relying only on noise statistics (as opposed to using additional mismatched measurements which increase the noise tolerance of this pr…
▽ More
In this paper we present a new proof technique for semi-quantum key distribution protocols which makes use of a quantum entropic uncertainty relation to bound an adversary's information. Our new technique provides a more optimistic key-rate bound than previous work relying only on noise statistics (as opposed to using additional mismatched measurements which increase the noise tolerance of this protocol, but at the cost of requiring four times the amount of measurement data). Our new technique may hold application in the proof of security of other semi-quantum protocols or protocols relying on two-way quantum communication.
△ Less
Submitted 6 January, 2018; v1 submitted 2 January, 2018;
originally announced January 2018.
-
Quantum key distribution with quantum walks
Authors:
Chrysoula Vlachou,
Walter Krawec,
Paulo Mateus,
Nikola Paunkovic,
Andre Souto
Abstract:
Quantum key distribution is one of the most fundamental cryptographic protocols. Quantum walks are important primitives for computing. In this paper we take advantage of the properties of quantum walks to design new secure quantum key distribution schemes. In particular, we introduce a secure quantum key-distribution protocol equipped with verification procedures against full man-in-the-middle att…
▽ More
Quantum key distribution is one of the most fundamental cryptographic protocols. Quantum walks are important primitives for computing. In this paper we take advantage of the properties of quantum walks to design new secure quantum key distribution schemes. In particular, we introduce a secure quantum key-distribution protocol equipped with verification procedures against full man-in-the-middle attacks. Furthermore, we present a one-way protocol and prove its security. Finally, we propose a semi-quantum variation and prove its robustness against eavesdrop**.
△ Less
Submitted 3 October, 2018; v1 submitted 22 October, 2017;
originally announced October 2017.
-
Limited Resource Semi-Quantum Key Distribution
Authors:
Walter O. Krawec,
Eric P. Geiss
Abstract:
A semi-quantum key distribution (SQKD) protocol allows a quantum user and a limited "classical" user to establish a shared secret key secure against an all-powerful adversary. In this work, we present a new SQKD protocol where the quantum user is also limited in her measurement capabilities. We describe the protocol, prove its security, and show its noise tolerance is as high as "fully quantum" QK…
▽ More
A semi-quantum key distribution (SQKD) protocol allows a quantum user and a limited "classical" user to establish a shared secret key secure against an all-powerful adversary. In this work, we present a new SQKD protocol where the quantum user is also limited in her measurement capabilities. We describe the protocol, prove its security, and show its noise tolerance is as high as "fully quantum" QKD protocols.
△ Less
Submitted 13 October, 2017;
originally announced October 2017.
-
Quantum Key Distribution with Mismatched Measurements over Arbitrary Channels
Authors:
Walter O. Krawec
Abstract:
In this paper, we derive key-rate expressions for different quantum key distribution protocols. Our key-rate equations utilize multiple channel statistics, including those gathered from mismatched measurement bases - i.e., when Alice and Bob choose incompatible bases. In particular, we will consider an Extended B92 and a two-way semi-quantum protocol. For both these protocols, we demonstrate that…
▽ More
In this paper, we derive key-rate expressions for different quantum key distribution protocols. Our key-rate equations utilize multiple channel statistics, including those gathered from mismatched measurement bases - i.e., when Alice and Bob choose incompatible bases. In particular, we will consider an Extended B92 and a two-way semi-quantum protocol. For both these protocols, we demonstrate that their tolerance to noise is higher than previously thought - in fact, we will show the semi-quantum protocol can actually tolerate the same noise level as the fully quantum BB84 protocol. Along the way, we will also consider an optimal QKD protocol for various quantum channels. Finally, all the key-rate expressions which we derive in this paper are applicable to any arbitrary, not necessarily symmetric, quantum channel.
△ Less
Submitted 14 June, 2017; v1 submitted 27 August, 2016;
originally announced August 2016.
-
Asymptotic Analysis of a Three State Quantum Cryptographic Protocol
Authors:
Walter O. Krawec
Abstract:
In this paper we consider a three-state variant of the BB84 quantum key distribution (QKD) protocol. We derive a new lower-bound on the key rate of this protocol in the asymptotic scenario and use mismatched measurement outcomes to improve the channel estimation. Our new key rate bound remains positive up to an error rate of $11\%$, exactly that achieved by the four-state BB84 protocol.
In this paper we consider a three-state variant of the BB84 quantum key distribution (QKD) protocol. We derive a new lower-bound on the key rate of this protocol in the asymptotic scenario and use mismatched measurement outcomes to improve the channel estimation. Our new key rate bound remains positive up to an error rate of $11\%$, exactly that achieved by the four-state BB84 protocol.
△ Less
Submitted 3 June, 2016; v1 submitted 2 January, 2016;
originally announced January 2016.
-
Security of a Semi-Quantum Protocol Where Reflections Contribute to the Secret Key
Authors:
Walter O. Krawec
Abstract:
In this paper we provide a proof of unconditional security for a semi-quantum key distribution protocol introduced in a previous work. This particular protocol demonstrated the possibility of using $X$ basis states to contribute to the raw key of the two users (as opposed to using only direct measurement results) even though a semi-quantum participant cannot directly manipulate such states. In thi…
▽ More
In this paper we provide a proof of unconditional security for a semi-quantum key distribution protocol introduced in a previous work. This particular protocol demonstrated the possibility of using $X$ basis states to contribute to the raw key of the two users (as opposed to using only direct measurement results) even though a semi-quantum participant cannot directly manipulate such states. In this work we provide a complete proof of security by deriving a lower bound of the protocol's key rate in the asymptotic scenario. Using this bound we are able to find an error threshold value such that for all error rates less than this threshold, it is guaranteed that $A$ and $B$ may distill a secure secret key; for error rates larger than this threshold, $A$ and $B$ should abort. We demonstrate that this error threshold compares favorably to several fully quantum protocols. We also comment on some interesting observations about the behavior of this protocol under certain noise scenarios.
△ Less
Submitted 24 October, 2015;
originally announced October 2015.
-
An Improved Asymptotic Key Rate Bound for a Mediated Semi-Quantum Key Distribution Protocol
Authors:
Walter O. Krawec
Abstract:
Semi-quantum key distribution (SQKD) protocols allow for the establishment of a secret key between two users Alice and Bob, when one of the two users (typically Bob) is limited or "classical" in nature. Recently it was shown that protocols exists when both parties are limited/classical in nature if they utilize the services of a quantum server. These protocols are called mediated SQKD protocols. T…
▽ More
Semi-quantum key distribution (SQKD) protocols allow for the establishment of a secret key between two users Alice and Bob, when one of the two users (typically Bob) is limited or "classical" in nature. Recently it was shown that protocols exists when both parties are limited/classical in nature if they utilize the services of a quantum server. These protocols are called mediated SQKD protocols. This server, however, is untrusted and, in fact, adversarial. In this paper, we reconsider a mediated SQKD protocol and derive a new proof of unconditional security for it. In particular, we derive a new lower bound on its key rate in the asymptotic scenario. Furthermore, we show this new lower bound is an improvement over prior work, thus showing that the protocol in question can tolerate higher rates of error than previously thought.
△ Less
Submitted 15 September, 2015;
originally announced September 2015.
-
Security Proof of a Semi-Quantum Key Distribution Protocol: Extended Version
Authors:
Walter O. Krawec
Abstract:
Semi-quantum key distribution protocols are designed to allow two users to establish a secure secret key when one of the two users is limited to performing certain "classical" operations. There have been several such protocols developed recently, however, due to their reliance on a two-way quantum communication channel (and thus, the attacker's opportunity to interact with the qubit twice), their…
▽ More
Semi-quantum key distribution protocols are designed to allow two users to establish a secure secret key when one of the two users is limited to performing certain "classical" operations. There have been several such protocols developed recently, however, due to their reliance on a two-way quantum communication channel (and thus, the attacker's opportunity to interact with the qubit twice), their security analysis is difficult and little is known concerning how secure they are compared to their fully quantum counterparts. In this paper we prove the unconditional security of a particular semi-quantum protocol. We derive an expression for the key rate of this protocol, in the asymptotic scenario, as a function of the quantum channel's noise. Finally, we will show that this semi-quantum protocol can tolerate a maximal noise level comparable to certain fully quantum protocols.
△ Less
Submitted 15 September, 2015; v1 submitted 30 November, 2014;
originally announced December 2014.
-
History Dependent Quantum Walk on the Cycle with an Unbalanced Coin
Authors:
Walter O. Krawec
Abstract:
Recently, a new model of quantum walk, utilizing recycled coins, was introduced; however little is yet known about its properties. In this paper, we study its behavior on the cycle graph. In particular, we will consider its time averaged distribution and how it is affected by the walk's "memory parameter" - a real parameter, between zero and eight, which affects the walk's coin flip operator. Desp…
▽ More
Recently, a new model of quantum walk, utilizing recycled coins, was introduced; however little is yet known about its properties. In this paper, we study its behavior on the cycle graph. In particular, we will consider its time averaged distribution and how it is affected by the walk's "memory parameter" - a real parameter, between zero and eight, which affects the walk's coin flip operator. Despite an infinite number of different parameters, our analysis provides evidence that only a few produce non-uniform behavior. Our analysis also shows that the initial state, and cycle size modulo four all affect the behavior of this walk. We also prove an interesting relationship between the recycled coin model and a different memory-based quantum walk recently proposed.
△ Less
Submitted 23 November, 2014;
originally announced November 2014.
-
Mediated Semi-Quantum Key Distribution
Authors:
Walter O. Krawec
Abstract:
In this paper, we design a new quantum key distribution protocol, allowing two limited semi-quantum or "classical" users to establish a shared secret key with the help of a fully quantum server. A semi-quantum user can only prepare and measure qubits in the computational basis and so must rely on this quantum server to produce qubits in alternative bases and also to perform alternative measurement…
▽ More
In this paper, we design a new quantum key distribution protocol, allowing two limited semi-quantum or "classical" users to establish a shared secret key with the help of a fully quantum server. A semi-quantum user can only prepare and measure qubits in the computational basis and so must rely on this quantum server to produce qubits in alternative bases and also to perform alternative measurements. However, we assume that the sever is untrusted and we prove the unconditional security of our protocol even in the worst case: when this quantum server is an all-powerful adversary. We also compute a lower bound of the key rate of our protocol, in the asymptotic scenario, as a function of the observed error rate in the channel allowing us to compute the maximally tolerated error of our protocol. Our results show that a semi-quantum protocol may hold similar security to a fully quantum one.
△ Less
Submitted 21 November, 2014;
originally announced November 2014.