| 研究生: |
呂優欽 Lu, Yu-Chin |
|---|---|
| 論文名稱: |
基於通道雜訊程度最佳化金鑰回收率的量子金鑰回收協定 Quantum Key Recycling with Optimal Key Recycling Rate based on Error Rate |
| 指導教授: |
黃宗立
Hwang, Tzone-lih |
| 學位類別: |
碩士 Master |
| 系所名稱: |
電機資訊學院 - 資訊工程學系 Department of Computer Science and Information Engineering |
| 論文出版年: | 2020 |
| 畢業學年度: | 108 |
| 語文別: | 英文 |
| 論文頁數: | 32 |
| 中文關鍵詞: | 量子密碼學 、量子金鑰回收 、金鑰回收率 、認證式量子協定 、通用可組合安全 、量子金鑰分配 、金鑰率 、金鑰分享率 |
| 外文關鍵詞: | Quantum Cryptography, Quantum Key Recycling, Key Recycling Rate, Authenticated Quantum Protocol, Universal Composable security, Quantum Key Distribution, Key Rate, Key Sharing Rate |
| 相關次數: | 點閱:136 下載:1 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
本論文提出了一可於雜訊通道中運行的量子金鑰回收(Quantum Key Recycling)協定,此協定能根據量子通道的雜訊程度回收使用過的加密金鑰。我們發現現存能於雜訊通道中運行的量子金鑰回收協定具有一共通的安全漏洞,因此我們提出了不具此漏洞的量子金鑰回收協定,且我們提出的量子金鑰回收協定基於量子通道實際的雜訊程度提升金鑰回收率。我們亦證明了在本協定中回收的金鑰具有無條件安全性並具有通用可組合性(universal composability)。另一方面,我們亦分析了使用量子金鑰回收協定來進行金鑰分配的可行性。為了比較量子金鑰回收協定與量子金鑰分配(Quantum Key Distribution)協定分配金鑰的效率,我們定義了金鑰分享率(key sharing rate)來比較兩類協定。我們發現使用我們提出的量子金鑰回收協定在特定情況下具有更高的金鑰分享率。
This thesis proposes a new Quantum Key Recycling (QKR) protocol, which recycles used keys according to the error rate. The proposed QKR protocol can tolerate the noise in the quantum channel. The earlier studies [1-4] also proposed QKR protocols with noise tolerance. Unfortunately, there is a common security loophole in these protocols. The proposed QKR protocol is designed to avoid this security loophole, and the key recycling rate of the pre-shared keys is optimized depending on the noise level. The security proof shows the security of the recycled keys is universal composable. This thesis also answers the question that is there any benefit for the QKR protocols to distribute keys as compared to the Quantum Key Distribution (QKD) protocols? The key sharing rate, which is the other version of the key rate, is defined to compare the efficiency of the proposed QKR protocol with that of QKD protocols. The key sharing rate can be calculated for both the QKD protocols and the QKR protocols, and the key sharing rate of the proposed QKR is then calculated. According to the comparison of the key sharing rate, this thesis finds that if using the proposed QKR protocol to distribute keys, it is more efficient than BB84 in some situations.
[1] S. Fehr, and L. Salvail, "Quantum Authentication and Encryption with Key Recycling," pp. 311-338: Springer International Publishing, 2017.
[2] D. Leermakers, and B. Škoric, “Security proof for quantum key recycling with noise,” Quantum Information & Computation, vol. 19, no. 11+ 12, pp. 0913-0934, 2019.
[3] B. Škorić, and M. De Vries, “Quantum Key Recycling with 8-state encoding (The Quantum One-Time Pad is more interesting than we thought),” International Journal of Quantum Information, vol. 15, no. 03, pp. 1750016, 2017.
[4] D. Leermakers, and B. Škoric, “Quantum Alice and Silent Bob,” arXiv preprint quant-ph/2003.11799, 2020.
[5] C. H. Bennett, G. Brassard, and S. Breidbart, “Quantum cryptography II: How to re-use a one-time pad safely even if P= NP,” Natural computing, vol. 13, no. 4, pp. 453-458, 2014.
[6] I. Damgård, T. B. Pedersen, and L. Salvail, "A Quantum Cipher with Near Optimal Key-Recycling," pp. 494-510: Springer Berlin Heidelberg, 2005.
[7] I. S. Reed, and G. Solomon, “Polynomial codes over certain finite fields,” Journal of the society for industrial and applied mathematics, vol. 8, no. 2, pp. 300-304, 1960.
[8] R. Gallager, “Low-density parity-check codes,” IRE Transactions on information theory, vol. 8, no. 1, pp. 21-28, 1962.
[9] D. Gottesman, “Uncloneable encryption,” arXiv preprint quant-ph/0210062, 2002.
[10] R. Renner, and R. König, “Universally composable privacy amplification against quantum adversaries,” in Theory of Cryptography Conference, 2005, pp. 407-425.
[11] D. Bruß, “Optimal Eavesdropping in Quantum Cryptography with Six States,” Physical Review Letters, vol. 81, no. 14, pp. 3018-3021, 1998.
[12] H. Bechmann-Pasquinucci, and N. Gisin, “Incoherent and coherent eavesdropping in the six-state protocol of quantum cryptography,” Physical Review A, vol. 59, no. 6, pp. 4238-4248, 1999.
[13] C. E. Shannon, “A mathematical theory of communication,” Bell system technical journal, vol. 27, no. 3, pp. 379-423, 1948.
[14] I. Bengtsson, and K. Życzkowski, Geometry of quantum states: an introduction to quantum entanglement: Cambridge university press, 2017.
[15] J. L. Carter, and M. N. Wegman, “Universal classes of hash functions,” Journal of computer and system sciences, vol. 18, no. 2, pp. 143-154, 1979.
[16] M. N. Wegman, and J. L. Carter, “New hash functions and their use in authentication and set equality,” Journal of computer and system sciences, vol. 22, no. 3, pp. 265-279, 1981.
[17] R. Renner, N. Gisin, and B. Kraus, “Information-theoretic security proof for quantum-key-distribution protocols,” Physical Review A, vol. 72, no. 1, 2005.
[18] I. Devetak, and A. Winter, “Distillation of secret key and entanglement from quantum states,” Proceedings of the Royal Society A: Mathematical, Physical and engineering sciences, vol. 461, no. 2053, pp. 207-235, 2005.
[19] P. Rogaway, “Bucket Hashing and Its Application to Fast Message Authentication,” vol. 12, no. 2, pp. 91-115, 1999.
[20] D. J. Robinson, An introduction to abstract algebra: Walter de Gruyter, 2008.
[21] E. Biham, and T. Mor, “Security of quantum cryptography against collective attacks,” Physical Review Letters, vol. 78, no. 11, pp. 2256, 1997.
[22] V. Scarani, H. Bechmann-Pasquinucci, N. J. Cerf, M. Dušek, N. Lütkenhaus, and M. Peev, “The security of practical quantum key distribution,” Reviews of Modern Physics, vol. 81, no. 3, pp. 1301-1350, 2009.
[23] C. E. Shannon, “Communication theory of secrecy systems,” Bell system technical journal, vol. 28, no. 4, pp. 656-715, 1949.
[24] D. R. Stinson, “Universal hashing and authentication codes,” Designs, Codes and Cryptography, vol. 4, no. 3, pp. 369-380, 1994.
[25] C. Portmann, “Key Recycling in Authentication,” vol. 60, no. 7, pp. 4383-4396, 2014.
[26] M. A. Nielsen, and I. Chuang, "Quantum computation and quantum information," AAPT, 2002.
[27] B. M. Terhal, M. Horodecki, D. W. Leung, and D. P. Divincenzo, “The entanglement of purification,” vol. 43, no. 9, pp. 4286, 2002.
[28] P. W. Shor, and J. Preskill, “Simple Proof of Security of the BB84 Quantum Key Distribution Protocol,” Physical Review Letters, vol. 85, no. 2, pp. 441-444, 2000.
[29] B. Škoric, and M. de Vries, “Quantum Key Recycling with eight-state encoding.”
[30] V. Scarani, and R. Renner, “Quantum cryptography with finite resources: Unconditional security bound for discrete-variable protocols with one-way postprocessing,” Physical review letters, vol. 100, no. 20, pp. 200501, 2008.
[31] W. O. Krawec, and E. P. Geiss, “Limited Resource Semi-Quantum Key Distribution,” arXiv preprint arXiv:1710.05076, 2017.
[32] C. Portmann, "Quantum Authentication with Key Recycling," pp. 339-368: Springer International Publishing, 2017.