TY - GEN
T1 - Security Analysis for BB84 Key Distillation
AU - Nikula, Sara
AU - Lintulampi, Anssi
AU - Halunen, Kimmo
PY - 2024
Y1 - 2024
N2 - Key distillation, also referred to as classical post-processing, plays a pivotal role in Quantum Key Distribution (QKD) protocols. Key distillation encompasses numerous subroutines, making the analysis of its overall security implications potentially challenging for those outside the research community. In this paper, we elucidate the role of the key distillation phase in QKD from a security standpoint. We begin by analyzing the different components of the key distillation phase individually, followed by an examination of the process as a whole. We then calculate the bit strength of the produced key, assuming that an attacker is executing an intercept and resend attack. For our analysis, we employ a practical key distillation implementation linked to a decoy state BB84 protocol as a case study. Our findings suggest that the security of the final key, post the key distillation phase, hinges on several factors. These include the theoretical security of the implemented subroutines, the total information leakage throughout the process, and the choices of subroutine parameters. Given these assumptions, we can distill 287 secure bits for every 1000 bits that undergo the key distillation procedure.
AB - Key distillation, also referred to as classical post-processing, plays a pivotal role in Quantum Key Distribution (QKD) protocols. Key distillation encompasses numerous subroutines, making the analysis of its overall security implications potentially challenging for those outside the research community. In this paper, we elucidate the role of the key distillation phase in QKD from a security standpoint. We begin by analyzing the different components of the key distillation phase individually, followed by an examination of the process as a whole. We then calculate the bit strength of the produced key, assuming that an attacker is executing an intercept and resend attack. For our analysis, we employ a practical key distillation implementation linked to a decoy state BB84 protocol as a case study. Our findings suggest that the security of the final key, post the key distillation phase, hinges on several factors. These include the theoretical security of the implemented subroutines, the total information leakage throughout the process, and the choices of subroutine parameters. Given these assumptions, we can distill 287 secure bits for every 1000 bits that undergo the key distillation procedure.
KW - BB84
KW - Classical Post-processing
KW - Key Distillation
KW - Quantum Key Distribution
KW - Security Analysis
UR - http://www.scopus.com/inward/record.url?scp=85202794756&partnerID=8YFLogxK
U2 - 10.5220/0012717500003767
DO - 10.5220/0012717500003767
M3 - Conference article in proceedings
AN - SCOPUS:85202794756
SN - 978-989-758-709-2
VL - 1
T3 - International Conference on Security and Cryptography (SECRYPT)
SP - 407
EP - 415
BT - Proceedings of the 21st International Conference on Security and Cryptography - SECRYPT
A2 - di Capitani di Vimercati, Sabrina
A2 - Samarati, Pierangela
PB - SciTePress
T2 - 21st International Conference on Security and Cryptography, SECRYPT 2024
Y2 - 8 July 2024 through 10 July 2024
ER -