# Experimental quantum cryptography

@article{Bennett2004ExperimentalQC, title={Experimental quantum cryptography}, author={Charles H. Bennett and François Bessette and Gilles Brassard and Louis Salvail and John A. Smolin}, journal={Journal of Cryptology}, year={2004}, volume={5}, pages={3-28} }

We describe results from an apparatus and protocol designed to implement quantum key distribution, by which two users, who share no secret information initially: (1) exchange a random quantum transmission, consisting of very faint flashes of polarized light; (2) by subsequent public discussion of the sent and received versions of this transmission estimate the extent of eavesdropping that might have taken place on it, and finally (3) if this estimate is small enough, distill from the sent and…

## Figures from this paper

## 103 Citations

Experimental realization of three quantum key distribution protocols

- Computer ScienceQuantum Inf. Process.
- 2020

Experimental verification of the BB84 protocol using three bases and experimental implementation of the B92 protocol, which was introduced by Charles Bennett in the year 1992, are performed.

A Survey and Comparison of Some of the Most Prominent QKD Protocols

- Computer Science
- 2021

This paper surveys some of the most prominent QKD protocols proposed till now, and then a comparative analysis on those protocols depending on various factors is performed.

A Quantum Key Distribution Protocol Based on the EPR Pairs and Its Simulation

- Computer ScienceSimuTools
- 2019

A novel quantum key distribution protocol based on entanglement and dense coding is proposed, which does not need to store the qubits and the trade-off between information and disturbance is calculated under the intercept-measure-resend attack andEntanglement-me measure attack, which tells that the protocol is asymptotically secure.

Ambiguous discrimination among linearly dependent quantum states and its application to two-way deterministic quantum key distribution

- PhysicsJournal of the Optical Society of America B
- 2019

It is impossible to distinguish a set of linearly dependent quantum states, which ensures the security of quantum key distribution (QKD). When considering some features such as symmetry, one may…

Deterministic secure quantum communication with and without entanglement

- Physics, Mathematics
- 2019

We present a quantum protocol for sending a deterministic message by encrypting each classical bit by two photons and using a quantum key. The protocol has two varieties where the two photons can be…

Numerical finite-key analysis of quantum key distribution

- Physics, Computer Science
- 2019

This work develops a robust numerical approach for calculating the key rates for QKD protocols in the finite-key regime in terms of two semi-definite programs (SDPs) that are formulated under the assumption of collective attacks from the eavesdropper and can be promoted to withstand coherent attacks using the postselection technique.

Security of Quantum Cryptography

- Computer ScienceSSCC
- 2019

The emphasis of this paper is to bring forth the newer security techniques paving way for information-theoretic security proofs leading to high QKD performance for market deployment, and discuss the recent quantum hacking on differentQKD protocols.

An improved quantum key distribution protocol for verification

- Computer ScienceJournal of Discrete Mathematical Sciences and Cryptography
- 2019

This work tries to improve the data security by increase the key size shared between parties involved used in quantum cryptography, eliminating the problem of unsafe storage.

Security of decoy-state protocols for general photon-number-splitting attacks

- Physics
- 2013

Decoy-state protocols provide a way to defeat photon-number splitting attacks in quantum cryptography implemented with weak coherent pulses. We point out that previous security analyses of such…

Security and communication distance improvement in decoy states based quantum key distribution using pseudo-random bases choice for photon polarization measurement

- 2021

This paper proposes a new quantum key distribution(QKD) protocol, namely the pseudo-random bases entangled photon based QKD (PRB-EPQKD) protocol. The latest mainly focuses on three properties,…

## References

SHOWING 1-10 OF 24 REFERENCES

Practical Quantum Oblivious Transfer

- Computer ScienceCRYPTO
- 1991

We describe a protocol for quantum oblivious transfer, utilizing faint pulses of polarized light, by which one of two mutually distrustful parties ("Alice") transmits two one-bit messages in such a…

Quantum Cryptography

- Computer ScienceEncyclopedia of Cryptography and Security
- 2005

A remarkable surge of interest in the international scientific and industrial community has propelled quantum cryptography into mainstream computer science and physics and it is becoming increasingly practical at a fast pace.

Quantum Cryptography, or Unforgeable Subway Tokens

- Computer ScienceCRYPTO
- 1982

The use of quantum mechanical systems to record information gives rise to novel cryptographic phenomena, not achievable with classical recording media, including the multiplexing of two messages in such a way that either message may be recovered at the cost of irreversibly destroying the other.

Quantum cryptography without Bell's theorem.

- Mathematics, MedicinePhysical review letters
- 1992

A related but simpler EPR scheme is described and it is proved it secure against more general attacks, including substitution of a fake EPR source and the original 1984 key distribution scheme of Bennett and Brassard, which uses single particles instead of EPR pairs.

An Update on Quantum Cryptography

- Computer ScienceCRYPTO
- 1984

It is proved that no technology whatsoever, as well as no amount of computing power, could break some of the authors' schemes, as long as some of the most fundamental principles of quantum physics hold true.

Experimental quantum cryptography: the dawn of a new era for quantum cryptography: the experimental prototype is working]

- Computer ScienceSIGA
- 1989

Quantum cryptography has recently entered the experimental era . The first convincingl y successful quantum exchange took place a few weeks ago . After a short historical revie w of quantum…

Achieving oblivious transfer using weakened security assumptions

- Computer Science[Proceedings 1988] 29th Annual Symposium on Foundations of Computer Science
- 1988

The authors present some general techniques for establishing the cryptographic strength of a wide variety of games and show that a noisy telephone line is in fact a very sophisticated cryptographic device.

Correct and private reductions among oblivious transfers

- Computer Science
- 1990

This work formalizes the notion of a reduction, that is a method by which one form of oblivious transfer can be achieved under the assumption that another form exists abstractly, and shows correct and private reductions between various notions of oblivioustransfer.

New Hash Functions and Their Use in Authentication and Set Equality

- Computer Science, MathematicsJ. Comput. Syst. Sci.
- 1981

Several new classes of hash functions with certain desirable properties are exhibited, and two novel applications for hashing which make use of these functions are introduced, including a provably secure authentication technique for sending messages over insecure lines and the application of testing sets for equality.

Quantum cryptography based on Bell's theorem.

- Computer Science, MedicinePhysical review letters
- 1991

Practical application of the generalized Bells theorem in the so-called key distribution process in cryptography is reported. The proposed scheme is based on the Bohms version of the…