# Fast and simple one-way quantum key distribution

@article{Stucki2005FastAS, title={Fast and simple one-way quantum key distribution}, author={Damien Stucki and Nicolas Brunner and Nicolas Gisin and Valerio Scarani and Hugo Zbinden}, journal={Applied Physics Letters}, year={2005}, volume={87}, pages={194108} }

We present and demonstrate a new protocol for practical quantum cryptography, tailored for an implementation with weak coherent pulses to obtain a high key generation rate. The key is obtained by a simple time-of-arrival measurement on the dataline; the presence of an eavesdropper is checked by an interferometer on an additional monitoring line. The setup is experimentally simple; moreover, it is tolerant to reduced interference visibility and to photon number splitting attacks, thus featuring…

## 241 Citations

### Quantum key distribution protocol with pseudorandom bases

- Computer ScienceArXiv
- 2017

This work considers a novel class of prepare-and-measure QKD protocols, utilizing additional pseudorandomness in the preparation of quantum states, and demonstrates that, for single-photon sources, the considered protocol gives better secret key rates than the BB84 and the asymmetric BB84 protocol.

### Megabits secure key rate quantum key distribution

- Computer Science, Physics2009 Conference on Lasers and Electro-Optics and 2009 Conference on Quantum electronics and Laser Science Conference
- 2009

This work implemented the differential phase shift (DPS) quantum key distribution (QKD) with an up-conversion-assisted hybrid photon detector (HPD) and achieved a 1.3 Mbits per second secure key rate over a 10 km fiber, which is tolerant against photon number splitting (PNS) attack, general collective attacks on individual photons and any other known sequential unambiguous state discrimination attacks.

### Simple security proof of coherent-one-way quantum key distribution.

- Computer ScienceOptics express
- 2022

A high-performance COW-QKD asymptotically secure against coherent attacks is provided by adding a two-pulse vacuum state as a new decoy sequence and providing an analytical upper bound on the phase error rate.

### Ultrafast quantum key distribution using fully parallelized quantum channels

- PhysicsOptics Express
- 2022

: The field of quantum information processing offers secure communication protected by the laws of quantum mechanics and is on the verge of finding wider application for information transfer of…

### Fast and Simple One-Way High-Dimensional Quantum Key Distribution

- Computer Science, PhysicsFrontiers in Optics + Laser Science 2021
- 2021

A novel scheme forber-based arbitrary-dimensional QKD, based on the most popular commercial hardware for binary time bins encoding, exhibiting a two-fold enhancement of the secret key rate in comparison to the binary Coherent One Way (COW) protocol, without introducing any hardware modiﬁcations.

### Manipulating photon coherence to enhance the security of practical quantum key distribution

- Computer Science
- 2017

This work implements the first DPR QKD system based on the differential quadrature phase shift protocol, which is modulator-free, does not require active stabilization or a complex receiver, and also offers megabit per second key rates, almost three times higher than the standard Bennett-Brassard 1984 protocol.

### Security proof for a simplified Bennett-Brassard 1984 quantum-key-distribution protocol

- Computer SciencePhysical Review A
- 2018

It is proved in a finite-key scenario that the security of the BB84 protocol can be maintained even with fewer measurement operators on the receiver, which allows to implement a time-bin encoding scheme with a minimum amount of resources.

### The security of practical quantum key distribution

- Computer Science
- 2009

Essential theoretical tools that have been developed to assess the security of the main experimental platforms are presented (discrete- variable, continuous-variable, and distributed-phase-reference protocols).

### Quantum key distribution over 25 km with an all-fiber continuous-variable system

- Physics
- 2007

We report on the implementation of a reverse-reconciliated coherent-state continuous-variable quantum key distribution system, with which we generated secret keys at a rate of more than 2 kb/s over…

### Simple and high-speed polarization-based QKD

- Physics
- 2018

We present a simplified BB84 protocol with only three quantum states and one decoy-state level. We implement this scheme using the polarization degree of freedom at telecom wavelength. Only one…

## References

SHOWING 1-9 OF 9 REFERENCES

### Beating the photon-number-splitting attack in practical quantum cryptography.

- Physics, Computer SciencePhysical review letters
- 2005

We propose an efficient method to verify the upper bound of the fraction of counts caused by multiphoton pulses in practical quantum key distribution using weak coherent light, given whatever type of…

### Quantum key distribution with high loss: toward global secure communication.

- Computer Science, PhysicsPhysical review letters
- 2003

A decoy-pulse method to overcome the photon-number-splitting attack for Bennett-Brassard 1984 quantum key distribution protocol in the presence of high loss by intentionally and randomly replacing signal pulses by multiphoton pulses (decoy pulses).

### Decoy state quantum key distribution.

- Physics, Computer SciencePhysical review letters
- 2005

The method is to use decoy states to detect eavesdropping attacks and has the best of both worlds--enjoying unconditional security guaranteed by the fundamental laws of physics and yet dramatically surpassing some of the best experimental performances reported in the literature.

### Security against individual attacks for realistic quantum key distribution

- Computer Science
- 2000

A formula for the secure bit rate per time slot of an experimental setup is obtained which can be used to optimize the performance of existing schemes for the considered scenario.

### Time coding protocols for quantum key distribution

- Physics, Computer Science
- 2004

A quantum formalism is given, allowing us to model the transmission of the key and the consequences of a possible eavesdropping, and the security of each protocol is evaluated as a function of channel losses, quantum bit error rate, and contrast loss in the case of intercept-resend attacks.

### Security aspects of practical quantum cryptography

- Computer ScienceConference Digest. 2000 International Quantum Electronics Conference (Cat. No.00TH8504)
- 2000

This work provides a thorough investigation of security issues for practical quantum key distribution, taking into account channel losses, and a realistic detection process.

### Robustness of differential-phase-shift quantum key distribution against photon-number-splitting attack

- Physics
- 2005

A photon-number-splitting (PNS) attack against differential-phase-shift (DPS) quantum key distribution (QKD) is described. In the conventional 1984 Bennett-Brassard protocol, using weak laser light,…

### Efficient Quantum Key Distribution Scheme and a Proof of Its Unconditional Security

- Computer ScienceJournal of Cryptology
- 2004

A simple modification that essentially doubles the efficiency of the BB84 quantum key distribution scheme and guarantees the security of the scheme against the most general eavesdropping strategy is devised, generalizing Shor and Preskill's proof of security of BB84.

### Quantum cryptography

- Computer Science
- 1996

The author revealed that quantum teleportation as “Quantum one-time-pad” had changed from a “classical teleportation” to an “optical amplification, privacy amplification and quantum secret growing” situation.