The security of practical quantum key distribution
- V. Scarani, H. Bechmann-Pasquinucci, N. Cerf, M. Dušek, N. Lutkenhaus, M. Peev
- Computer Science
- 28 February 2008
Essential theoretical tools that have been developed to assess the security of the main experimental platforms are presented (discrete- variable, continuous-variable, and distributed-phase-reference protocols).
Nonlocality was discovered by John Bell in 1964, in the context of the debates about quantum theory, but is a phenomenon that can be studied in its own right. Its observation proves that measurements…
Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations.
- V. Scarani, A. Acín, G. Ribordy, N. Gisin
- Computer Science, MathematicsPhysical Review Letters
- 20 November 2002
A new class of quantum key distribution protocols, tailored to be robust against photon number splitting (PNS) attacks are introduced, which differs from the original protocol by Bennett and Brassard (BB84) only in the classical sifting procedure.
Device-independent quantum key distribution secure against collective attacks
This proof exploits the full structure of quantum theory, but only holds against collective attacks, where the eavesdropper is assumed to act on the quantum systems of the honest parties independently and identically in each round of the protocol.
Information causality as a physical principle
- M. Pawłowski, T. Paterek, D. Kaszlikowski, V. Scarani, A. Winter, M. Żukowski
- Computer ScienceNature
- 14 May 2009
It is suggested that information causality—a generalization of the no-signalling condition—might be one of the foundational properties of nature and help to distinguish physical theories from non-physical ones.
Device-independent security of quantum cryptography against collective attacks.
- A. Acín, N. Brunner, N. Gisin, S. Massar, Stefano Pironio, V. Scarani
- Computer SciencePhysical Review Letters
- 15 February 2007
The main result is a tight bound on the Holevo information between one of the authorized parties and the eavesdropper, as a function of the amount of violation of a Bell-type inequality.
Quantum cryptography with finite resources: unconditional security bound for discrete-variable protocols with one-way postprocessing.
A bound for the security of quantum key distribution with finite resources under one-way postprocessing is derived, based on a definition of security that is composable and has an operational meaning, for standard protocols such as Bennett-Brassard 1984 and six-states protocol.
Security proof for quantum key distribution using qudit systems
In the asymptotic regime, both the secret key rate for fixed noise and the robustness to noise increase with d, and the finite key corrections are found to be almost insensitive to d.
Reference-frame-independent quantum key distribution
The asymptotic secret key rate for a two-qubit source is computed, which coincides with the rate of the six-state protocol for white noise, and a scheme for physical implementation in the three-dimensional qutrit case is detailed.
Fast and simple one-way quantum key distribution
A new protocol for practical quantum cryptography, tailored for an implementation with weak coherent pulses to obtain a high key generation rate, featuring a high efficiency in terms of distilled secret bit per qubit.