Back to Search
Start Over
Lightweight authentication for quantum key distribution
- Publication Year :
- 2019
- Publisher :
- arXiv, 2019.
-
Abstract
- Quantum key distribution (QKD) enables unconditionally secure communication between distinct parties using a quantum channel and an authentic public channel. Reducing the portion of quantum-generated secret keys, that is consumed during the authentication procedure, is of significant importance for improving the performance of QKD systems. In the present work, we develop a lightweight authentication protocol for QKD based on a `ping-pong' scheme of authenticity check for QKD. An important feature of this scheme is that the only one authentication tag is generated and transmitted during each of the QKD post-processing rounds. For the tag generation purpose, we design an unconditionally secure procedure based on the concept of key recycling. The procedure is based on the combination of almost universal$_2$ polynomial hashing, XOR universal$_2$ Toeplitz hashing, and one-time pad (OTP) encryption. We demonstrate how to minimize both the length of the recycled key and the size of the authentication key, that is required for OTP encryption. As a result, in real case scenarios, the portion of quantum-generated secret keys that is consumed for the authentication purposes is below 1\%. Finally, we provide a security analysis of the full quantum key growing process in the framework of universally composable security.<br />Comment: 16 pages, 5 figures, 4 tables
- Subjects :
- FOS: Computer and information sciences
Security analysis
Computer Science - Cryptography and Security
Computer science
Computer Science - Information Theory
Hash function
FOS: Physical sciences
02 engineering and technology
Quantum channel
Library and Information Sciences
Quantum key distribution
Encryption
Secure communication
0202 electrical engineering, electronic engineering, information engineering
Quantum Physics
Authentication
business.industry
Information Theory (cs.IT)
020206 networking & telecommunications
Computer Science Applications
Authentication protocol
business
Quantum Physics (quant-ph)
Cryptography and Security (cs.CR)
Information Systems
Computer network
Subjects
Details
- Database :
- OpenAIRE
- Accession number :
- edsair.doi.dedup.....db87667faccb7a9552c7f424e3e77f66
- Full Text :
- https://doi.org/10.48550/arxiv.1903.10237