Limitations on practical quantum cryptography

@article{Brassard2000LimitationsOP,
  title={Limitations on practical quantum cryptography},
  author={Brassard and Lutkenhaus and Mor and Sanders},
  journal={Physical review letters},
  year={2000},
  volume={85 6},
  pages={
          1330-3
        }
}
We provide limits to practical quantum key distribution, taking into account channel losses, a realistic detection process, and imperfections in the "qubits" sent from the sender to the receiver. As we show, even quantum key distribution with perfect qubits might not be achievable over long distances when the other imperfections are taken into account. Furthermore, existing experimental schemes (based on weak pulses) currently do not offer unconditional security for the reported distances and… Expand

Topics from this paper

Fast and simple one-way quantum key distribution
We present and demonstrate a new protocol for practical quantum cryptography, tailored for an implementation with weak coherent pulses to obtain a high key generation rate. The key is obtained by aExpand
Unconditional security of practical quantum key distribution
TLDR
This paper is identical to the preprint arXiv:quant-ph/0107017, which was finalized in 2001, therefore, some of the more recent developments, including the question of composability, are not addressed. Expand
Attacks on Fixed Apparatus Quantum Key Distribution Schemes
TLDR
It is shown that, although theoretical quantum key distribution (QKD) is proven secure, such implementations are totally insecure against a strong eavesdropper that has a one-time access to the receiver's equipment. Expand
Attacks on Fixed Apparatus Quantum Key Distribution Schemes
TLDR
The "fixed-apparatus attack" causes a potential risk to the usefulness of several recent quantum key distribution implementations, and is shown to be totally insecure against a strong eavesdropper that has one-time access to the receiver's equipment. Expand
Megabits secure key rate quantum key distribution
Quantum cryptography can provide unconditional secure communication between two authorized parties based on the basic principles of quantum mechanics. However, imperfect practical conditions limitExpand
Practical quantum key distribution with geometrically uniform states
In this paper we propose a practical quantum key distribution protocol based on geometrically uniform states and a standard decoy state technique. The protocol extends the ideas used in SARG04 to theExpand
Secure quantum key distribution with a single not-so-weak coherent pulse.
TLDR
The security of the QKD protocol, which counters the photon number splitting and the impersonation attacks, is analyzed and the possibility of quantum secure direct communication is discussed. Expand
Practical quantum cryptography
We report our recent results in development of the secure fiber-optics communication system based upon quantum key distribution (QKD). Emphasize is made on the limitation imposed by theExpand
Practical long-distance quantum key distribution system using decoy levels
Quantum key distribution (QKD) has the potential for widespread real-world applications, but no secure long-distance experiment has demonstrated the truly practical operation needed to move QKD fromExpand
Quantum Entanglement and Engineering 8 Quantum State Generation in Optical Frequency Combs for Quantum Computing
Quantum key distribution (QKD) promises a theoretically unbreakable cryptosystem by employing the probabilistic nature of quantum measurement over mutually unbiased bases, making it superior toExpand
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 54 REFERENCES
Quantum cryptography via parametric downconversion
The use of quantum bits (qubits) in cryptography holds the promise of secure cryptographic quantum key distribution schemes. It is based usually on single-photon polarization states. Unfortunately,Expand
Quantum cryptography with coherent states.
  • Huttner, Imoto, Gisin, Mor
  • Physics, Medicine
  • Physical review. A, Atomic, molecular, and optical physics
  • 1995
TLDR
This work discusses quantum cryptographic protocols based on the transmission of weak coherent states and presents a system, based on a symbiosis of two existing systems, for which the information available to the eavesdropper is significantly reduced and is therefore safer than the two previous ones. Expand
Security against individual attacks for realistic quantum key distribution
I prove the security of quantum key distribution against individual attacks for realistic signals sources, including weak coherent pulses and downconversion sources. The proof applies to the BB84Expand
Experimental Quantum Cryptography
TLDR
Initial results from an apparatus and protocol designed to implement quantum public key distribution are described, by which two users exchange a random quantum transmission, consisting of very faint flashes of polarized light, which remains secure against an adversary with unlimited computing power. Expand
Unconditional security in quantum cryptography
  • D. Mayers
  • Computer Science, Mathematics
  • JACM
  • 2001
TLDR
Basic techniques to prove the unconditional security of quantum crypto graphy are described and a practical variation on the protocol in which the channel is noisy and photos may be lost during the transmission is considered. Expand
Quantum cryptography using any two nonorthogonal states.
  • Bennett
  • Computer Science, Medicine
  • Physical review letters
  • 1992
TLDR
It is shown that in principle any two nonorthogonal quantum states suffice, and a practical interferometric realization using low-intensity coherent light pulses is described. Expand
Quantum key distribution over distances as long as 30 km.
TLDR
Low error rates were obtained for the quantum transmissions, and error-free secret keys were distilled from the raw data by use of secure error-correction and privacy-amplification protocols. Expand
Practical quantum cryptography based on two-photon interferometry.
TLDR
The experimental setup consists of an external source of correlated photon pairs which propagate to two widely separated unbalanced Mach-Zehnder interferometers and can be fully modulated by phase plates in either interferometer. Expand
FREE-SPACE QUANTUM-KEY DISTRIBUTION
Nonproliferation and International Security,Los Alamos, NM 87545(February 1, 2008)A working free-space quantum key distribution (QKD)system has been developed and tested over a 205-m indooropticalExpand
Quantum Key Distribution and String Oblivious Transfer in Noisy Channels
TLDR
A lemma is proved that extends a security proof given by Yao for a (one bit) QOT protocol to this String-QOT protocol, which implies the unconditional security of the QKD protocol despite the previous proof that unconditionally secure bit commitment schemes are impossible. Expand
...
1
2
3
4
5
...