Fast and simple one-way quantum key distribution

@article{Stucki2005FastAS,
  title={Fast and simple one-way quantum key distribution},
  author={Damien Stucki and Nicolas Brunner and Nicolas Gisin and Valerio Scarani and Hugo Zbinden},
  journal={Applied Physics Letters},
  year={2005},
  volume={87},
  pages={194108}
}
We present and demonstrate a new protocol for practical quantum cryptography, tailored for an implementation with weak coherent pulses to obtain a high key generation rate. The key is obtained by a simple time-of-arrival measurement on the dataline; the presence of an eavesdropper is checked by an interferometer on an additional monitoring line. The setup is experimentally simple; moreover, it is tolerant to reduced interference visibility and to photon number splitting attacks, thus featuring… 
Security proof for a simplified Bennett-Brassard 1984 quantum-key-distribution protocol
The security of quantum key distribution (QKD) has been proven for different protocols, in particular for the BB84 protocol. It has been shown that this scheme is robust against eventual
A quantum key distribution protocol for rapid denial of service detection
We introduce a quantum key distribution protocol designed to expose fake users that connect to Alice or Bob for the purpose of monopolising the link and denying service. It inherently resists
Practical quantum key distribution systems based on faint laser pulses
  • G. Ribordy
  • Physics
    2006 Digest of the LEOS Summer Topical Meetings
  • 2006
In this paper, the functioning and the performance of the auto-compensated quantum cryptography system developed is presented. The optical apparatus, as well as the hardware platform controlling it
Coherent one-way quantum conference key agreement based on twin field
TLDR
Inspired by the coherent one-way and twin-field quantum key distribution protocols, a quantum CKA protocol of three users is proposed that can break the limit of the total efficiency among quantum channels.
A fast and versatile quantum key distribution system with hardware key distillation and wavelength multiplexing
We present a compactly integrated, 625 MHz clocked coherent one-way quantum key distribution system which continuously distributes secret keys over an optical fibre link. To support high secret key
Quantum key establishment via a multimode fiber.
TLDR
This work proposes and demonstrates a fundamentally new concept for remote key establishment that allows high-dimensional alphabets using spatial degrees of freedom by transmitting information through a light-scrambling multimode fiber and exploiting the no-cloning theorem.
QUANTUM KEY DISTRIBUTION THROUGH AN ANISOTROPIC DEPOLARIZING QUANTUM CHANNEL
Quantum cryptography is one of the major applications of quantum information theories. However, the Quantum key distribution (QKD) introduced by Bennett and Brassard in 1984 which is known as BB84
Practical quantum key distribution protocol without monitoring signal disturbance
TLDR
It is found that a practical implementation using a laser pulse train achieves a key rate comparable to a decoy-state QKD protocol, an often-used technique for lasers and has a better tolerance of bit errors and of finite-sized-key effects.
Security and implementation of differential phase shift quantum key distribution systems
Quantum information processing has attracted a lot of attention in recent years because of the promise it holds for faster, better, and more secure future communications. The most advanced field in
A high-speed multi-protocol quantum key distribution transmitter based on a dual-drive modulator.
TLDR
Experimental results show that the proposed transmitter is suitable for implementation of the Bennett and Brassard 1984 (BB84), coherent one-way (COW) and differential phase shift (DPS) protocols with stable and low quantum bit error rate.
...
1
2
3
4
5
...

References

SHOWING 1-9 OF 9 REFERENCES
Beating the photon-number-splitting attack in practical quantum cryptography.
We propose an efficient method to verify the upper bound of the fraction of counts caused by multiphoton pulses in practical quantum key distribution using weak coherent light, given whatever type of
Limitations on practical quantum cryptography
TLDR
It is shown that parametric down-conversion offers enhanced performance compared to its weak coherent pulse counterpart and existing experimental schemes (based on weak pulses) currently do not offer unconditional security for the reported distances and signal strength.
Quantum key distribution with high loss: toward global secure communication.
  • W. Hwang
  • Computer Science, Medicine
    Physical review letters
  • 2003
TLDR
A decoy-pulse method to overcome the photon-number-splitting attack for Bennett-Brassard 1984 quantum key distribution protocol in the presence of high loss by intentionally and randomly replacing signal pulses by multiphoton pulses (decoy pulses).
Decoy state quantum key distribution.
TLDR
The method is to use decoy states to detect eavesdropping attacks and has the best of both worlds--enjoying unconditional security guaranteed by the fundamental laws of physics and yet dramatically surpassing some of the best experimental performances reported in the literature.
Security against individual attacks for realistic quantum key distribution
I prove the security of quantum key distribution against individual attacks for realistic signals sources, including weak coherent pulses and downconversion sources. The proof applies to the BB84
Time coding protocols for quantum key distribution
We propose quantum key distribution protocols based on coherent single-photon optical pulses with duration T and with minimum time-frequency uncertainty. The pulses are sent with possible delays
Robustness of differential-phase-shift quantum key distribution against photon-number-splitting attack
A photon-number-splitting (PNS) attack against differential-phase-shift (DPS) quantum key distribution (QKD) is described. In the conventional 1984 Bennett-Brassard protocol, using weak laser light,
Efficient Quantum Key Distribution Scheme and a Proof of Its Unconditional Security
TLDR
A simple modification that essentially doubles the efficiency of the BB84 quantum key distribution scheme and guarantees the security of the scheme against the most general eavesdropping strategy is devised, generalizing Shor and Preskill's proof of security of BB84.
Quantum Cryptography
TLDR
A remarkable surge of interest in the international scientific and industrial community has propelled quantum cryptography into mainstream computer science and physics and it is becoming increasingly practical at a fast pace.