[Quantum-Physics Seminar] Leftover hashing from quantum error correction: Unifying the two approaches to the security proof of quantum key distribution (in Japanese)
SPEAKER
Toyohiro Tsurumaru, Mitsubishi Electric
PLACE
Seminar room, Kenkyu honkan 3F
We show that the Mayers-Shor-Preskill approach and Renner’s approach to proving the security of quantum key distribution (QKD) are essentially the same. We begin our analysis by considering a special case of QKD called privacy amplification (PA). PA itself is an important building block of cryptography, both classical and quantum. The standard theoretical tool used for its security proof is called the leftover hashing lemma (LHL). We present a direct connection between the LHL and the coding theorem of a certain quantum error correction code. Then we apply this result to proving the equivalence between the two approaches to proving the security of QKD.
(References)
T. Tsurumaru, “Leftover Hashing From Quantum Error Correction: Unifying the Two Approaches to the Security Proof of Quantum Key Distribution”, in IEEE Transactions on Information Theory, vol. 66, no. 6, pp. 3465-3484, June 2020, (arXiv:1809.05479).
[Quantum-Physics Seminar] Leftover hashing from quantum error correction: Unifying the two approaches to the security proof of quantum key distribution (in Japanese)