The Security of Practical Quantum Key Distribution
نویسندگان
چکیده
Valerio Scarani , Helle Bechmann-Pasquinucci , Nicolas J. Cerf , Miloslav Dušek , Norbert Lütkenhaus , Momtchil Peev 9 1 Centre for Quantum Technologies and Department of Physics, National University of Singapore, Singapore 2 Group of Applied Physics, University of Geneva, Geneva, Switzerland 3 University of Pavia, Dipartimento di Fisica “A. Volta”, Pavia, Italy 4 UCCI.IT, Rovagnate (LC), Italy 5 Quantum Information and Communication, Ecole Polytechnique, Université Libre de Bruxelles, Brussels, Belgium 6 Department of Optics, Faculty of Science, Palacký University, Olomouc, Czech Republic 7 Institute for Quantum Computing & Department for Physics and Astronomy, University of Waterloo, Waterloo, Canada 8 Max Planck Research Group, Institute for Optics, Information and Photonics, University of Erlangen-Nuremberg, Erlangen, Germany 9 Quantum Technologies, Smart Systems Division, Austrian Research Centers GmbH ARC, Vienna, Austria
منابع مشابه
Randomness determines practical security of BB84 quantum key distribution
Unconditional security of the BB84 quantum key distribution protocol has been proved by exploiting the fundamental laws of quantum mechanics, but the practical quantum key distribution system maybe hacked by considering the imperfect state preparation and measurement respectively. Until now, different attacking schemes have been proposed by utilizing imperfect devices, but the general security ...
متن کاملSecurity of Quantum Cryptography with Realistic Sources
The interest in practical implementations of quantum key distribution (QKD) is steadily growing. However, there is still a need to give a precise security statement which adapts to realistic implementation. In this paper I give the effective key rate we can obtain in a practical setting within the scenario of security against individual attacks by an eavesdropper. It illustrates previous result...
متن کاملSecurity of practical phase-coding quantum key distribution
Security proof of practical quantum key distribution (QKD) has attracted a lot of attentions in recent years. Most of real-life QKD implementations are based on phase-coding BB84 protocol, which usually uses Unbalanced Mach-Zehnder Interferometer (UMZI) as the information coder and decoder. However, the long arm and short arm of UMZI will introduce different loss in practical experimental reali...
متن کاملInformation geometric security analysis of differential phase-shift quantum key distribution protocol
This paper analyzes the information-theoretical security of the Differential Phase Shift (DPS) Quantum Key Distribution (QKD) protocol, using efficient computational information geometric algorithms. The DPS QKD protocol was introduced for practical reasons, since the earlier QKD schemes were too complicated to implement in practice. The DPS QKD protocol can be an integrated part of current net...
متن کاملQuantum Erasure Cryptography
The phenomenon of quantum erasure has long intrigued physicists, but has surprisingly found limited practical application. Here, we propose a protocol for quantum key distribution (QKD) based on quantum erasure, promising inherent security against detector attacks. We particularly demonstrate its security against a powerful detector-blinding attack.
متن کاملQuantum key distribution with authentication
The security of the previous quantum key distribution (QKD) protocols, which is guaranteed by the nature of physics law, is based on the legitimate users. However, impersonation of the legitimate communicators by eavesdroppers, in practice, will be inevitable. In fact, the previous QKD protocols is un secure without authentication in practical communication. In this paper, we proposed an improv...
متن کامل