Security of Quantum Cryptography with Realistic Sources
نویسنده
چکیده
The interest in practical implementations of quantum key distribution (QKD) is steadily growing. However, there is still a need to give a precise security statement which adapts to realistic implementation. In this paper I give the effective key rate we can obtain in a practical setting within the scenario of security against individual attacks by an eavesdropper. It illustrates previous results that high losses together with detector dark counts can make secure QKD impossible.
منابع مشابه
On the Security of Quantum Cryptography Against Collective Attacks
We present strong attacks against quantum key distribution schemes which use quantum memories and quantum gates to attack directly the final key. We analyze a specific attack of this type, for which we find the density matrices available to the eavesdropper and the optimal information which can be extracted from them. We prove security against this attack and discuss security against any attack...
متن کاملQuantum Information Processing with Non-classical Light
Quantum information processing (QIP) is a field concerned with technological applications of quantum mechanical phenonomena. In many cases, photons are an ideal quantum system for such applications. Photons exhibit superb coherence properties, are robust to environmental noise, and can be transmitted over long distances. One of the main difficulties of photon based quantum information processin...
متن کاملQuantum Computers Render Quantum Key Distribution Unconditionally Secure Over Arbitrarily Long Distances
Quantum cryptography has long been claimed to be useful for achieving many tasks that are impossible from the perspective of conventional cryptography. Arguably, the most important problem in quantum cryptography has been a rigorous proof of the security of quantum key distribution, the most well-known application. This notoriously hard problem has eluded researchers for years and has become ev...
متن کامل2 2 M ay 1 99 8 Quantum Computers Render Quantum Key Distribution Unconditionally Secure
Quantum cryptography has long been claimed to be useful for achieving many tasks that are impossible from the perspective of conventional cryptography. Arguably, the most important problem in quantum cryptography has been a rigorous proof of the security of quantum key distribution, the most wellknown application. This notoriously hard problem has eluded researchers for the last fifteen years a...
متن کاملQuantum cryptography: a practical information security perspective
Quantum Key Exchange (QKE, also known as Quantum Key Distribution or QKD) allows communicating parties to securely establish cryptographic keys. It is a well-established fact that all QKE protocols require that the parties have access to an authentic channel. Without this authenticated link, QKE is vulnerable to man-in-the-middle attacks. Overlooking this fact results in exaggerated claims and/...
متن کامل