The Security of Practical Quantum Key Distribution

نویسندگان

  • Valerio Scarani
  • Helle Bechmann-Pasquinucci
  • Nicolas J. Cerf
  • Miloslav Dušek
  • Momtchil Peev
چکیده

Valerio Scarani , Helle Bechmann-Pasquinucci , Nicolas J. Cerf , Miloslav Dušek , Norbert Lütkenhaus , Momtchil Peev 9 1 Centre for Quantum Technologies and Department of Physics, National University of Singapore, Singapore 2 Group of Applied Physics, University of Geneva, Geneva, Switzerland 3 University of Pavia, Dipartimento di Fisica “A. Volta”, Pavia, Italy 4 UCCI.IT, Rovagnate (LC), Italy 5 Quantum Information and Communication, Ecole Polytechnique, Université Libre de Bruxelles, Brussels, Belgium 6 Department of Optics, Faculty of Science, Palacký University, Olomouc, Czech Republic 7 Institute for Quantum Computing & Department for Physics and Astronomy, University of Waterloo, Waterloo, Canada 8 Max Planck Research Group, Institute for Optics, Information and Photonics, University of Erlangen-Nuremberg, Erlangen, Germany 9 Quantum Technologies, Smart Systems Division, Austrian Research Centers GmbH ARC, Vienna, Austria

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Randomness determines practical security of BB84 quantum key distribution

Unconditional security of the BB84 quantum key distribution protocol has been proved by exploiting the fundamental laws of quantum mechanics, but the practical quantum key distribution system maybe hacked by considering the imperfect state preparation and measurement respectively. Until now, different attacking schemes have been proposed by utilizing imperfect devices, but the general security ...

متن کامل

Security of Quantum Cryptography with Realistic Sources

The interest in practical implementations of quantum key distribution (QKD) is steadily growing. However, there is still a need to give a precise security statement which adapts to realistic implementation. In this paper I give the effective key rate we can obtain in a practical setting within the scenario of security against individual attacks by an eavesdropper. It illustrates previous result...

متن کامل

Security of practical phase-coding quantum key distribution

Security proof of practical quantum key distribution (QKD) has attracted a lot of attentions in recent years. Most of real-life QKD implementations are based on phase-coding BB84 protocol, which usually uses Unbalanced Mach-Zehnder Interferometer (UMZI) as the information coder and decoder. However, the long arm and short arm of UMZI will introduce different loss in practical experimental reali...

متن کامل

Information geometric security analysis of differential phase-shift quantum key distribution protocol

This paper analyzes the information-theoretical security of the Differential Phase Shift (DPS) Quantum Key Distribution (QKD) protocol, using efficient computational information geometric algorithms. The DPS QKD protocol was introduced for practical reasons, since the earlier QKD schemes were too complicated to implement in practice. The DPS QKD protocol can be an integrated part of current net...

متن کامل

Quantum Erasure Cryptography

The phenomenon of quantum erasure has long intrigued physicists, but has surprisingly found limited practical application. Here, we propose a protocol for quantum key distribution (QKD) based on quantum erasure, promising inherent security against detector attacks. We particularly demonstrate its security against a powerful detector-blinding attack.

متن کامل

Quantum key distribution with authentication

The security of the previous quantum key distribution (QKD) protocols, which is guaranteed by the nature of physics law, is based on the legitimate users. However, impersonation of the legitimate communicators by eavesdroppers, in practice, will be inevitable. In fact, the previous QKD protocols is un secure without authentication in practical communication. In this paper, we proposed an improv...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009