Unifying classical and quantum key distillation

Assume that two distant parties, Alice and Bob, as well as an adversary, Eve, have access to (quantum) systems prepared jointly according to a tripartite state. In addition, Alice and Bob can use local operations and authenticated public classical communication. Their goal is to establish a key whic...

Celý popis

Podrobná bibliografie
Hlavní autoři: Christandl, M, Ekert, A, Horodecki, M, Horodecki, P, Oppenheim, J, Renner, R
Médium: Conference item
Vydáno: Springer 2006
_version_ 1826287056512352256
author Christandl, M
Ekert, A
Horodecki, M
Horodecki, P
Oppenheim, J
Renner, R
author_facet Christandl, M
Ekert, A
Horodecki, M
Horodecki, P
Oppenheim, J
Renner, R
author_sort Christandl, M
collection OXFORD
description Assume that two distant parties, Alice and Bob, as well as an adversary, Eve, have access to (quantum) systems prepared jointly according to a tripartite state. In addition, Alice and Bob can use local operations and authenticated public classical communication. Their goal is to establish a key which is unknown to Eve. We initiate the study of this scenario as a unification of two standard scenarios: (i) key distillation (agreement) from classical correlations and (ii) key distillation from pure tripartite quantum states. Firstly, we obtain generalisations of fundamental results related to scenarios (i) and (ii), including upper bounds on the key rate. Moreover, based on an embedding of classical distributions into quantum states, we are able to find new connections between protocols and quantities in the standard scenarios (i) and (ii). Secondly, we study specific properties of key distillation protocols. In particular, we show that every protocol that makes use of pre-shared key can be transformed into an equally efficient protocol which needs no pre-shared key. This result is of practical significance as it applies to quantum key distribution (QKD) protocols, but it also implies that the key rate cannot be locked with information on Eve's side. Finally, we exhibit an arbitrarily large separation between the key rate in the standard setting where Eve is equipped with quantum memory and the key rate in a setting where Eve is only given classical memory. This shows that assumptions on the nature of Eve's memory are important in order to determine the correct security threshold in QKD.
first_indexed 2024-03-07T01:52:54Z
format Conference item
id oxford-uuid:9abab7fb-34e2-4cae-9e94-78001343a2a0
institution University of Oxford
last_indexed 2024-03-07T01:52:54Z
publishDate 2006
publisher Springer
record_format dspace
spelling oxford-uuid:9abab7fb-34e2-4cae-9e94-78001343a2a02022-03-27T00:23:21ZUnifying classical and quantum key distillationConference itemhttp://purl.org/coar/resource_type/c_5794uuid:9abab7fb-34e2-4cae-9e94-78001343a2a0Symplectic Elements at OxfordSpringer2006Christandl, MEkert, AHorodecki, MHorodecki, POppenheim, JRenner, RAssume that two distant parties, Alice and Bob, as well as an adversary, Eve, have access to (quantum) systems prepared jointly according to a tripartite state. In addition, Alice and Bob can use local operations and authenticated public classical communication. Their goal is to establish a key which is unknown to Eve. We initiate the study of this scenario as a unification of two standard scenarios: (i) key distillation (agreement) from classical correlations and (ii) key distillation from pure tripartite quantum states. Firstly, we obtain generalisations of fundamental results related to scenarios (i) and (ii), including upper bounds on the key rate. Moreover, based on an embedding of classical distributions into quantum states, we are able to find new connections between protocols and quantities in the standard scenarios (i) and (ii). Secondly, we study specific properties of key distillation protocols. In particular, we show that every protocol that makes use of pre-shared key can be transformed into an equally efficient protocol which needs no pre-shared key. This result is of practical significance as it applies to quantum key distribution (QKD) protocols, but it also implies that the key rate cannot be locked with information on Eve's side. Finally, we exhibit an arbitrarily large separation between the key rate in the standard setting where Eve is equipped with quantum memory and the key rate in a setting where Eve is only given classical memory. This shows that assumptions on the nature of Eve's memory are important in order to determine the correct security threshold in QKD.
spellingShingle Christandl, M
Ekert, A
Horodecki, M
Horodecki, P
Oppenheim, J
Renner, R
Unifying classical and quantum key distillation
title Unifying classical and quantum key distillation
title_full Unifying classical and quantum key distillation
title_fullStr Unifying classical and quantum key distillation
title_full_unstemmed Unifying classical and quantum key distillation
title_short Unifying classical and quantum key distillation
title_sort unifying classical and quantum key distillation
work_keys_str_mv AT christandlm unifyingclassicalandquantumkeydistillation
AT ekerta unifyingclassicalandquantumkeydistillation
AT horodeckim unifyingclassicalandquantumkeydistillation
AT horodeckip unifyingclassicalandquantumkeydistillation
AT oppenheimj unifyingclassicalandquantumkeydistillation
AT rennerr unifyingclassicalandquantumkeydistillation