TY - JOUR
T1 - The universal composable security of quantum key distribution
AU - Ben-Or, Michael
AU - Horodecki, Michal
AU - Leung, Debbie W.
AU - Mayers, Dominic
AU - Oppenheim, Jonathan
PY - 2005
Y1 - 2005
N2 - The existing unconditional security definitions of quantum key distribution (QKD) do not apply to joint attacks over QKD and the subsequent use of the resulting key. In this paper, we close this potential security gap by using a universal composability theorem for the quantum setting. We first derive a composable security definition for QKD. We then prove that the usual security definition of QKD still implies the composable security definition. Thus, a key produced in any QKD protocol that is unconditionally secure in the usual definition can indeed be safely used, a property of QKD that is hitherto unproven. We propose two other useful sufficient conditions for composability. As a simple application of our result, we show that keys generated by repeated runs of QKD degrade slowly.
AB - The existing unconditional security definitions of quantum key distribution (QKD) do not apply to joint attacks over QKD and the subsequent use of the resulting key. In this paper, we close this potential security gap by using a universal composability theorem for the quantum setting. We first derive a composable security definition for QKD. We then prove that the usual security definition of QKD still implies the composable security definition. Thus, a key produced in any QKD protocol that is unconditionally secure in the usual definition can indeed be safely used, a property of QKD that is hitherto unproven. We propose two other useful sufficient conditions for composability. As a simple application of our result, we show that keys generated by repeated runs of QKD degrade slowly.
UR - http://www.scopus.com/inward/record.url?scp=24144445587&partnerID=8YFLogxK
U2 - 10.1007/978-3-540-30576-7_21
DO - 10.1007/978-3-540-30576-7_21
M3 - ???researchoutput.researchoutputtypes.contributiontojournal.conferencearticle???
AN - SCOPUS:24144445587
SN - 0302-9743
VL - 3378
SP - 386
EP - 406
JO - Lecture Notes in Computer Science
JF - Lecture Notes in Computer Science
T2 - Second Theory of Cryptography Conference, TCC 2005
Y2 - 10 February 2005 through 12 February 2005
ER -