{"title":"强信息论认证量子密码中密钥搜索复杂度的研究","authors":"S. P. Kulik, S. N. Molotkov","doi":"10.1134/S002136402460544X","DOIUrl":null,"url":null,"abstract":"<p>The stability of quantum key distribution systems is based not only on the detection of attacks on quantum states, which is guaranteed by the fundamental quantum theory laws, but also on ensuring the integrity of classical messages transmitted through an auxiliary classical communication channel. To detect attacks on the classic communication channel, the authentication procedure is used. Information-theoretic authentication guarantees the detection of attacks on the classical communication channel regardless of the computational and technical capabilities of an eavesdropper, including the quantum computer. The fundamental quantum cryptographic relationship between the abstract criterion of the robustness of quantum key distribution systems with theoretical-information authentication and the quantum key search complexity has been determined for the first time using simple means.</p>","PeriodicalId":604,"journal":{"name":"JETP Letters","volume":"121 6","pages":"481 - 489"},"PeriodicalIF":1.4000,"publicationDate":"2025-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1134/S002136402460544X.pdf","citationCount":"0","resultStr":"{\"title\":\"On the Key Search Complexity in Quantum Cryptography with Strong Information-Theoretic Authentication\",\"authors\":\"S. P. Kulik, S. N. Molotkov\",\"doi\":\"10.1134/S002136402460544X\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<p>The stability of quantum key distribution systems is based not only on the detection of attacks on quantum states, which is guaranteed by the fundamental quantum theory laws, but also on ensuring the integrity of classical messages transmitted through an auxiliary classical communication channel. To detect attacks on the classic communication channel, the authentication procedure is used. Information-theoretic authentication guarantees the detection of attacks on the classical communication channel regardless of the computational and technical capabilities of an eavesdropper, including the quantum computer. The fundamental quantum cryptographic relationship between the abstract criterion of the robustness of quantum key distribution systems with theoretical-information authentication and the quantum key search complexity has been determined for the first time using simple means.</p>\",\"PeriodicalId\":604,\"journal\":{\"name\":\"JETP Letters\",\"volume\":\"121 6\",\"pages\":\"481 - 489\"},\"PeriodicalIF\":1.4000,\"publicationDate\":\"2025-05-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://link.springer.com/content/pdf/10.1134/S002136402460544X.pdf\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"JETP Letters\",\"FirstCategoryId\":\"101\",\"ListUrlMain\":\"https://link.springer.com/article/10.1134/S002136402460544X\",\"RegionNum\":4,\"RegionCategory\":\"物理与天体物理\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"PHYSICS, MULTIDISCIPLINARY\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"JETP Letters","FirstCategoryId":"101","ListUrlMain":"https://link.springer.com/article/10.1134/S002136402460544X","RegionNum":4,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"PHYSICS, MULTIDISCIPLINARY","Score":null,"Total":0}
On the Key Search Complexity in Quantum Cryptography with Strong Information-Theoretic Authentication
The stability of quantum key distribution systems is based not only on the detection of attacks on quantum states, which is guaranteed by the fundamental quantum theory laws, but also on ensuring the integrity of classical messages transmitted through an auxiliary classical communication channel. To detect attacks on the classic communication channel, the authentication procedure is used. Information-theoretic authentication guarantees the detection of attacks on the classical communication channel regardless of the computational and technical capabilities of an eavesdropper, including the quantum computer. The fundamental quantum cryptographic relationship between the abstract criterion of the robustness of quantum key distribution systems with theoretical-information authentication and the quantum key search complexity has been determined for the first time using simple means.
期刊介绍:
All topics of experimental and theoretical physics including gravitation, field theory, elementary particles and nuclei, plasma, nonlinear phenomena, condensed matter, superconductivity, superfluidity, lasers, and surfaces.