# Limitations on practical quantum cryptography

@article{Brassard2000LimitationsOP, title={Limitations on practical quantum cryptography}, author={Brassard and Lutkenhaus and Mor and Sanders}, journal={Physical review letters}, year={2000}, volume={85 6}, pages={ 1330-3 } }

We provide limits to practical quantum key distribution, taking into account channel losses, a realistic detection process, and imperfections in the "qubits" sent from the sender to the receiver. As we show, even quantum key distribution with perfect qubits might not be achievable over long distances when the other imperfections are taken into account. Furthermore, existing experimental schemes (based on weak pulses) currently do not offer unconditional security for the reported distances and…

## 851 Citations

Fast and simple one-way quantum key distribution

- Physics, Computer Science
- 2005

A new protocol for practical quantum cryptography, tailored for an implementation with weak coherent pulses to obtain a high key generation rate, featuring a high efficiency in terms of distilled secret bit per qubit.

Unconditional security of practical quantum key distribution

- Computer Science
- 2007

This paper is identical to the preprint arXiv:quant-ph/0107017, which was finalized in 2001, therefore, some of the more recent developments, including the question of composability, are not addressed.

Attacks on Fixed Apparatus Quantum Key Distribution Schemes

- Physics, Computer ScienceTPNC
- 2012

It is shown that, although theoretical quantum key distribution (QKD) is proven secure, such implementations are totally insecure against a strong eavesdropper that has a one-time access to the receiver's equipment.

Attacks on Fixed Apparatus Quantum Key Distribution Schemes

- Computer Science, PhysicsArXiv
- 2013

The "fixed-apparatus attack" causes a potential risk to the usefulness of several recent quantum key distribution implementations, and is shown to be totally insecure against a strong eavesdropper that has one-time access to the receiver's equipment.

Megabits secure key rate quantum key distribution

- Computer Science, Physics
- 2009

The differential phase shift (DPS) quantum key distribution (QKD) with an up-conversion-assisted hybrid photon detector (HPD) is implemented and achieved a 1.3 Mbits per second secure key rate over a 10 km fiber, which is tolerant against photon number splitting (PNS) attack, general collective attacks on individual photons and any other known sequential unambiguous state discrimination (USD) attacks.

Practical quantum key distribution with geometrically uniform states

- Computer SciencePhysical Review A
- 2019

The protocol extends the ideas used in SARG04 to the limit where the core quantum communication is secure against unambiguous state discrimination and provides some level of inherent resistance to photon number splitting attacks.

Secure quantum key distribution with a single not-so-weak coherent pulse.

- Physics, Computer ScienceOptics letters
- 2007

The security of the QKD protocol, which counters the photon number splitting and the impersonation attacks, is analyzed and the possibility of quantum secure direct communication is discussed.

Practical quantum cryptography

- Physics, Computer ScienceSPIE Defense + Commercial Sensing
- 2004

The first test of the QKD system using single photons produced by non-degenerate parametric down-conversion as a source is described and the main restriction on the distance range and the secure key rate is placed upon the weak coherent pulses.

Practical long-distance quantum key distribution system using decoy levels

- Physics
- 2009

Quantum key distribution (QKD) has the potential for widespread real-world applications, but no secure long-distance experiment has demonstrated the truly practical operation needed to move QKD from…

Quantum Entanglement and Engineering 8 Quantum State Generation in Optical Frequency Combs for Quantum Computing

- Computer Science, Physics

An example side channel attack is introduced with the avalanche photodiode backflash attack, with results indicating the ability for this attack to, in principle, succeed.

## References

SHOWING 1-10 OF 53 REFERENCES

Quantum cryptography via parametric downconversion

- Physics, Computer Science
- 2002

This work investigates another potential implementation of quantum key distribution: qubits generated using a process of parametric downconversion, and finds that, to first (two-photon) and second (four-Photon) order in the parametricDownconversion small parameter, this implementation is equivalent to the theoretical version.

Quantum cryptography with coherent states.

- Computer Science, PhysicsPhysical review. A, Atomic, molecular, and optical physics
- 1995

This work discusses quantum cryptographic protocols based on the transmission of weak coherent states and presents a system, based on a symbiosis of two existing systems, for which the information available to the eavesdropper is significantly reduced and is therefore safer than the two previous ones.

Security against individual attacks for realistic quantum key distribution

- Computer Science
- 2000

A formula for the secure bit rate per time slot of an experimental setup is obtained which can be used to optimize the performance of existing schemes for the considered scenario.

Experimental Quantum Cryptography

- Computer ScienceEUROCRYPT
- 1990

Initial results from an apparatus and protocol designed to implement quantum public key distribution are described, by which two users exchange a random quantum transmission, consisting of very faint flashes of polarized light, which remains secure against an adversary with unlimited computing power.

Unconditional security in quantum cryptography

- Computer ScienceJACM
- 2001

Basic techniques to prove the unconditional security of quantum crypto graphy are described and a practical variation on the protocol in which the channel is noisy and photos may be lost during the transmission is considered.

Quantum cryptography using any two nonorthogonal states.

- PhysicsPhysical review letters
- 1992

It is shown that in principle any two nonorthogonal quantum states suffice, and a practical interferometric realization using low-intensity coherent light pulses is described.

Quantum key distribution over distances as long as 30 km.

- Computer Science, MathematicsOptics letters
- 1995

Low error rates were obtained for the quantum transmissions, and error-free secret keys were distilled from the raw data by use of secure error-correction and privacy-amplification protocols.

Practical quantum cryptography based on two-photon interferometry.

- Physics, MathematicsPhysical review letters
- 1992

The experimental setup consists of an external source of correlated photon pairs which propagate to two widely separated unbalanced Mach-Zehnder interferometers and can be fully modulated by phase plates in either interferometer.

FREE-SPACE QUANTUM-KEY DISTRIBUTION

- Physics
- 1998

Nonproliferation and International Security,Los Alamos, NM 87545(February 1, 2008)A working free-space quantum key distribution (QKD)system has been developed and tested over a 205-m indooroptical…

Quantum Key Distribution and String Oblivious Transfer in Noisy Channels

- Computer Science, MathematicsCRYPTO
- 1996

A lemma is proved that extends a security proof given by Yao for a (one bit) QOT protocol to this String-QOT protocol, which implies the unconditional security of the QKD protocol despite the previous proof that unconditionally secure bit commitment schemes are impossible.