Quantum-Locked Key Distribution at Nearly the Classical Capacity Rate

Quantum data locking is a protocol that allows for a small secret key to (un)lock an exponentially larger amount of information, hence yielding the strongest violation of the classical one-time pad encryption in the quantum setting. This violation mirrors a large gap existing between two security cr...

Full description

Bibliographic Details
Main Authors: Lupo, Cosmo (Contributor), Lloyd, Seth (Contributor)
Other Authors: Massachusetts Institute of Technology. Department of Mechanical Engineering (Contributor), Massachusetts Institute of Technology. Research Laboratory of Electronics (Contributor)
Format: Article
Language:English
Published: American Physical Society, 2014-10-20T19:24:57Z.
Subjects:
Online Access:Get fulltext
LEADER 01787 am a22002173u 4500
001 91009
042 |a dc 
100 1 0 |a Lupo, Cosmo  |e author 
100 1 0 |a Massachusetts Institute of Technology. Department of Mechanical Engineering  |e contributor 
100 1 0 |a Massachusetts Institute of Technology. Research Laboratory of Electronics  |e contributor 
100 1 0 |a Lupo, Cosmo  |e contributor 
100 1 0 |a Lloyd, Seth  |e contributor 
700 1 0 |a Lloyd, Seth  |e author 
245 0 0 |a Quantum-Locked Key Distribution at Nearly the Classical Capacity Rate 
260 |b American Physical Society,   |c 2014-10-20T19:24:57Z. 
856 |z Get fulltext  |u http://hdl.handle.net/1721.1/91009 
520 |a Quantum data locking is a protocol that allows for a small secret key to (un)lock an exponentially larger amount of information, hence yielding the strongest violation of the classical one-time pad encryption in the quantum setting. This violation mirrors a large gap existing between two security criteria for quantum cryptography quantified by two entropic quantities: the Holevo information and the accessible information. We show that the latter becomes a sensible security criterion if an upper bound on the coherence time of the eavesdropper's quantum memory is known. Under this condition, we introduce a protocol for secret key generation through a memoryless qudit channel. For channels with enough symmetry, such as the d-dimensional erasure and depolarizing channels, this protocol allows secret key generation at an asymptotic rate as high as the classical capacity minus one bit. 
520 |a United States. Defense Advanced Research Projects Agency. Quiness Program (United States. Army Research Office. Award W31P4Q-12-1-0019) 
546 |a en 
655 7 |a Article 
773 |t Physical Review Letters