Skip to main content
Log in

On the complexity of search for keys in quantum cryptography

  • Quantum Informatics
  • Published:
JETP Letters Aims and scope Submit manuscript

Abstract

The trace distance is used as a security criterion in proofs of security of keys in quantum cryptography. Some authors doubted that this criterion can be reduced to criteria used in classical cryptography. The following question has been answered in this work. Let a quantum cryptography system provide an ε-secure key such that ½‖ρ XE − ρ U ⊗ ρ E 1 < ε, which will be repeatedly used in classical encryption algorithms. To what extent does the ε-secure key reduce the number of search steps (guesswork) as compared to the use of ideal keys? A direct relation has been demonstrated between the complexity of the complete consideration of keys, which is one of the main security criteria in classical systems, and the trace distance used in quantum cryptography. Bounds for the minimum and maximum numbers of search steps for the determination of the actual key have been presented.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. C. H. Bennett and G. Brassard, in Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, 1984, p. 175.

    Google Scholar 

  2. R. Renner, PhD Thesis (ETH Zürich, 2005).

    Google Scholar 

  3. H. P. Yuen, Phys. A 82, 062304 (2010), H. P. Yuen, arXiv: 1109.1051 [quant-ph], H. P. Yuen, arXiv: 1109.2675 [quant-ph], H. P. Yuen, arXiv: 1109.1066 [quant-ph], R. Renner, 1209.2423 [quant-ph].

    Google Scholar 

  4. C. Portmann and R. Renner, arXiv: 1409.3525 [quant-ph].

  5. J. L. Massey, in Proceedings of the IEEE International Symposium on Information Theory, June 27–July 1, 1994, p. 204.

    Google Scholar 

  6. J. O. Pliam, PhD Thesis (Minnesota University, 1999).

    Google Scholar 

  7. T. M. Cover and J. A. Thomas, Elements of Information Theory (Wiley, New York, 1991).

    Book  MATH  Google Scholar 

  8. M. Nielsen and I. Chuang, Quantum Computation and Quantum Information (Cambridge Univ. Press, Cambridge, 2000).

    MATH  Google Scholar 

  9. A. de Santis, A. G. Gaggia, and U. Vaccaro, IEEE Trans. Inform. Theory 47, 468 (2001).

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. N. Molotkov.

Additional information

Original Russian Text © S.N. Molotkov, 2016, published in Pis’ma v Zhurnal Eksperimental’noi i Teoreticheskoi Fiziki, 2016, Vol. 103, No. 5, pp. 389–393.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Molotkov, S.N. On the complexity of search for keys in quantum cryptography. Jetp Lett. 103, 345–349 (2016). https://doi.org/10.1134/S002136401605009X

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1134/S002136401605009X

Keywords

Navigation