Dresden 2026 – wissenschaftliches Programm
Bereiche | Tage | Auswahl | Suche | Aktualisierungen | Downloads | Hilfe
AKPIK: Arbeitskreis Physik, moderne Informationstechnologie und Künstliche Intelligenz
AKPIK 6: AI Methods for Physics and Materials Science
AKPIK 6.1: Vortrag
Donnerstag, 12. März 2026, 16:45–17:00, BEY/0127
Recycling resources from aborted quantum key distribution protocols — •Siyuan Qi1 and Ramona Wolf2 — 1Universität Siegen, Siegen, Germany — 2Universität Siegen, Siegen, Germany
In quantum key distribution protocols, abortion often occurs due to detected errors or leakages. A secure protocol must ensure that if abortion does not occur, the generated key is secure. However, when abortion happens, the resources used are lost and cannot be reused, leading to waste. A malicious party, Eve, can exploit this by intentionally interfering with the protocol, forcing an abortion every time it's run. While Eve cannot obtain the secret key or avoid detection, she can prevent key generation and cause significant resource waste, which is undesirable in practical scenarios. This issue can be addressed by implementing procedures that recycle resources from aborted protocols or by preventing Eve from interfering in such a way. A protocol is aborted when the minimum entropy of the key generated does not exceed the leakage. If an abortion is caused by large leakage, we can still generate certified private randomness from the minimum entropy, provided it is not zero. Additionally, in specific scenarios where there is an identity designation process involved, we can move the identity designation to the last round so that Eve, not knowing she is a participant or not until the very end, will be discouraged from malicious behaviors.
Keywords: Quantum Cryptography; Quantum Key Distribution; Anonymous Quantum Key Distribution; Protocol Robustness; Private Randomness Generation
